Analysis
-
max time kernel
144s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/11/2022, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe
Resource
win10v2004-20220901-en
General
-
Target
7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe
-
Size
623KB
-
MD5
9e92fdcce30e558761fed5a53a237620
-
SHA1
acf2ce619a19b6f0fab81b9a7def73d093e61a9b
-
SHA256
7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754
-
SHA512
589bdddc993a77c667f28c087c5dd54e09c6af2e983c7151f8359cc40b1a614923834a7cfa9f708c351102f40f82806a4e4653467b820118ce43bee771a603c9
-
SSDEEP
12288:moxd1p2q4yysfWS0WFhZ28l2muHCys/HGPgoc0RkurOelhbuyH:moL2Ay2WuFhtduiysf1oouqeeyH
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\TakeAuthority\Command\ = "cmd.exe /c takeown /f \"%1\" && icacls \"%1\" /grant administrators:F" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas\command regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas\command\ = "\"%1\" %*" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\TakeAuthority regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\TakeAuthority\ = "管理员取得所有权" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\TakeAuthority\Command regedit.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" regedit.exe -
Deletes itself 1 IoCs
pid Process 568 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\垃圾清理(勿删).exe 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\垃圾清理(勿删).exe 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regedit.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1100-77-0x0000000140000000-0x00000001400E6000-memory.dmp autoit_exe behavioral1/memory/1100-86-0x0000000140000000-0x00000001400E6000-memory.dmp autoit_exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\devmgmt.msc mmc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Disables Windows logging functionality 2 TTPs
Changes registry settings to disable Windows Event logging.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Internet Explorer\Main 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" regedit.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MINIE regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MINIE\ShowStatusBar = "1" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MINIE\AlwaysShowMenus = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MINIE\AlwaysShowMenus = "1" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\AlwaysShowMenus = "1" regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MINIE\ShowStatusBar = "1" regedit.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\MINIE regedit.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\StatusBarOther = "1" regedit.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.haol23.hk" 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\HungAppTimeout = "5000" regedit.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WaitToKillAppTimeout = "2000" regedit.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\Keyboard regedit.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Keyboard\InitialKeyboardIndicators = "2" regedit.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\Desktop regedit.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\7DevMgr\command regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.mpeg\ShellEx\{BB2E617C-0920-11D1-9A0B-00C04FC2D6C1} regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.mpg\ShellEx regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shell\runas\Command\ = "cmd.exe /c takeown /f \"%1\" /r /d y && icacls \"%1\" /grant administrators:F /t" regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.mpeg\ShellEx regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.wmv\ShellEx\{BB2E617C-0920-11D1-9A0B-00C04FC2D6C1} regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\runas\Command regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\7DevMgr\command\ = "%windir%\\system32\\mmc.exe /s %windir%\\system32\\devmgmt.msc" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Dezinstall\ = "添加或删除程序" regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.avi\ShellEx\{BB2E617C-0920-11D1-9A0B-00C04FC2D6C1} regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.asf\ShellEx regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.mpg\ShellEx\{BB2E617C-0920-11D1-9A0B-00C04FC2D6C1} regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\runas regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shell\runas regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shell\runas\ = "管理员取得所有权" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shell\runas\Command regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\7DevMgr regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\7DevMgr\ = "@%windir%\\system32\\devmgr.dll,-4" regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.avi\ShellEx\{e357fccd-a995-4576-b01f-234630154e96} regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.avi\ShellEx regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.asf\ShellEx\{BB2E617C-0920-11D1-9A0B-00C04FC2D6C1} regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.asf\ShellEx\{e357fccd-a995-4576-b01f-234630154e96} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas\command\ = "\"%1\" %*" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Dezinstall regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.mpeg\ShellEx\{e357fccd-a995-4576-b01f-234630154e96} regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\TakeAuthority regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\TakeAuthority\ = "管理员取得所有权" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\7DevMgr\SuppressionPolicy = "1073741884" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Dezinstall\SuppressionPolicy = "1073741884" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Dezinstall\command\ = "rundll32.exe shell32.dll,Control_RunDLL appwiz.cpl" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\runas\Command\ = "cmd.exe /c takeown /f \"%1\" && icacls \"%1\" /grant administrators:F" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\TakeAuthority\Command regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Dezinstall\command regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.wmv\ShellEx\{e357fccd-a995-4576-b01f-234630154e96} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\runas\ = "管理员取得所有权" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.mpg\ShellEx\{e357fccd-a995-4576-b01f-234630154e96} regedit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\.wmv\ShellEx regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\TakeAuthority\Command\ = "cmd.exe /c takeown /f \"%1\" && icacls \"%1\" /grant administrators:F" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\runas\command regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1820 regedit.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 692 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 956 mmc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 956 mmc.exe Token: SeIncBasePriorityPrivilege 956 mmc.exe Token: 33 956 mmc.exe Token: SeIncBasePriorityPrivilege 956 mmc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 956 mmc.exe 956 mmc.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1928 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 27 PID 1100 wrote to memory of 1928 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 27 PID 1100 wrote to memory of 1928 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 27 PID 1928 wrote to memory of 1820 1928 cmd.exe 29 PID 1928 wrote to memory of 1820 1928 cmd.exe 29 PID 1928 wrote to memory of 1820 1928 cmd.exe 29 PID 1100 wrote to memory of 1444 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 30 PID 1100 wrote to memory of 1444 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 30 PID 1100 wrote to memory of 1444 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 30 PID 1100 wrote to memory of 1116 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 32 PID 1100 wrote to memory of 1116 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 32 PID 1100 wrote to memory of 1116 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 32 PID 1444 wrote to memory of 956 1444 cmd.exe 34 PID 1444 wrote to memory of 956 1444 cmd.exe 34 PID 1444 wrote to memory of 956 1444 cmd.exe 34 PID 1100 wrote to memory of 376 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 35 PID 1100 wrote to memory of 376 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 35 PID 1100 wrote to memory of 376 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 35 PID 1100 wrote to memory of 592 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 37 PID 1100 wrote to memory of 592 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 37 PID 1100 wrote to memory of 592 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 37 PID 1100 wrote to memory of 1784 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 39 PID 1100 wrote to memory of 1784 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 39 PID 1100 wrote to memory of 1784 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 39 PID 1100 wrote to memory of 1068 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 41 PID 1100 wrote to memory of 1068 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 41 PID 1100 wrote to memory of 1068 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 41 PID 1100 wrote to memory of 2040 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 43 PID 1100 wrote to memory of 2040 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 43 PID 1100 wrote to memory of 2040 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 43 PID 1100 wrote to memory of 2028 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 45 PID 1100 wrote to memory of 2028 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 45 PID 1100 wrote to memory of 2028 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 45 PID 1100 wrote to memory of 568 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 47 PID 1100 wrote to memory of 568 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 47 PID 1100 wrote to memory of 568 1100 7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe 47 PID 568 wrote to memory of 692 568 cmd.exe 49 PID 568 wrote to memory of 692 568 cmd.exe 49 PID 568 wrote to memory of 692 568 cmd.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe"C:\Users\Admin\AppData\Local\Temp\7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe"1⤵
- Drops startup file
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c regedit /s "C:\Users\Admin\AppData\Local\Temp\7yh.reg"2⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\regedit.exeregedit /s "C:\Users\Admin\AppData\Local\Temp\7yh.reg"3⤵
- Modifies system executable filetype association
- UAC bypass
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Runs .reg file with regedit
PID:1820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c devmgmt.msc2⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\devmgmt.msc"3⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del /f /s /q %windir%\*.bak2⤵PID:1116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del /f /s /q %windir%\prefetch\*.*2⤵PID:376
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rd /s /q %windir%\temp & md %windir%\temp2⤵PID:592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rem del /f /q %userprofile%\cookies\*.*2⤵PID:1784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.*2⤵PID:1068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del /f /s /q %userprofile%\Local Settings\Temp\*.*2⤵PID:2040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del /f /s /q %userprofile%\recent\*.*2⤵PID:2028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ping 127.0.0.1 -n 3&del /q "C:\Users\Admin\AppData\Local\Temp\7ffffc8824697aaefeb826f50ee9a2eef27c068abe0f9d74bd6fe4b667c55754.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:692
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5522e1c86c0fb779ee19d03f6872a6843
SHA1d8598bcf7d5829535ecab51f84b3c54238320375
SHA256f040cca38d439f7d69ad7c6fe115571ecc43cd400a17e940150c6b1ff0d6a2ba
SHA512799217f9357f74c050d1a921acd6fb72625a4cb6ec2191b540bbc3ff272981dae990c134ee3aa4dd4ea0d5857f60cd81fe8fe5ef4954f9c080891788590208e6