Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-01-2024 19:41
Static task
static1
Behavioral task
behavioral1
Sample
7b1c0139de262799dca2bb054e3db974.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b1c0139de262799dca2bb054e3db974.exe
Resource
win10v2004-20231215-en
General
-
Target
7b1c0139de262799dca2bb054e3db974.exe
-
Size
1.1MB
-
MD5
7b1c0139de262799dca2bb054e3db974
-
SHA1
813a541911b719a91d374b01dc213cfafac8a5a8
-
SHA256
360fabfed6012b75c71ad592029662aa60655237b5196554958a6d12a1614db8
-
SHA512
4782f79350f6401354156c67195031e2d13b5d8b3c82f305fa4c06ed7a75a321d1df7f2fa905d44f9d31a034d8d9422c2d1ec74a5a460f0ba2a41e25c30b086a
-
SSDEEP
24576:nXQKznLsKA4bTlV9vwSfeqsxC3oh4Rj5xrYIKsIdHf:DFTl7vyYUQ9KZ
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0038000000015cbd-34.dat acprotect behavioral1/files/0x0007000000015cf9-32.dat acprotect behavioral1/files/0x0006000000016cdc-118.dat acprotect -
Executes dropped EXE 10 IoCs
pid Process 824 IUB.EXE 2840 ashsvc.exe 2300 COM2.EXE 1172 SVCHOSI.EXE 860 SVCHOSI.EXE 1868 COM1.EXE 2568 ashsvc.exe 1792 IUB.EXE 1048 COM2.EXE 888 IUB.EXE -
Loads dropped DLL 20 IoCs
pid Process 1752 7b1c0139de262799dca2bb054e3db974.exe 1752 7b1c0139de262799dca2bb054e3db974.exe 824 IUB.EXE 824 IUB.EXE 2840 ashsvc.exe 2840 ashsvc.exe 824 IUB.EXE 824 IUB.EXE 2300 COM2.EXE 2300 COM2.EXE 824 IUB.EXE 824 IUB.EXE 2300 COM2.EXE 2300 COM2.EXE 2568 ashsvc.exe 2568 ashsvc.exe 1172 SVCHOSI.EXE 1172 SVCHOSI.EXE 1172 SVCHOSI.EXE 1172 SVCHOSI.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinSix = "C:\\Windows\\System32\\SVCHOSI.EXE" REG.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SVCHOSI.exe SVCHOSI.EXE File opened for modification C:\Windows\SysWOW64\2026\2045\ashsvc.exe COM2.EXE File created C:\Windows\SysWOW64\2026\2045\ssleay32.dll COM2.EXE File created C:\Windows\SysWOW64\2026\2045\libeay32.dll COM2.EXE File opened for modification C:\Windows\SysWOW64\SVCHOSI.EXE IUB.EXE File opened for modification C:\Windows\SysWOW64\SVCHOSI.EXE COM2.EXE File opened for modification C:\Windows\SysWOW64\2026\2045\libeay32.dll COM2.EXE File created C:\Windows\SysWOW64\SVCHOSI.EXE IUB.EXE File created C:\Windows\SysWOW64\SVCHOSI.EXE COM2.EXE File opened for modification C:\Windows\SysWOW64\2026\ COM2.EXE File created C:\Windows\SysWOW64\2026\2045\ashsvc.exe COM2.EXE File opened for modification C:\Windows\SysWOW64\2026\desktop.ini COM2.EXE File created C:\Windows\SysWOW64\2026\desktop.ini COM2.EXE File opened for modification C:\Windows\SysWOW64\2026\2045\ssleay32.dll COM2.EXE -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2868 REG.exe 2948 REG.exe 1844 REG.exe 2052 REG.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2840 ashsvc.exe 2840 ashsvc.exe 2568 ashsvc.exe 2568 ashsvc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2840 ashsvc.exe 2568 ashsvc.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1752 7b1c0139de262799dca2bb054e3db974.exe 824 IUB.EXE 2300 COM2.EXE 1172 SVCHOSI.EXE 860 SVCHOSI.EXE 1868 COM1.EXE 1792 IUB.EXE 1048 COM2.EXE 888 IUB.EXE -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1752 wrote to memory of 824 1752 7b1c0139de262799dca2bb054e3db974.exe 28 PID 1752 wrote to memory of 824 1752 7b1c0139de262799dca2bb054e3db974.exe 28 PID 1752 wrote to memory of 824 1752 7b1c0139de262799dca2bb054e3db974.exe 28 PID 1752 wrote to memory of 824 1752 7b1c0139de262799dca2bb054e3db974.exe 28 PID 824 wrote to memory of 2840 824 IUB.EXE 29 PID 824 wrote to memory of 2840 824 IUB.EXE 29 PID 824 wrote to memory of 2840 824 IUB.EXE 29 PID 824 wrote to memory of 2840 824 IUB.EXE 29 PID 1752 wrote to memory of 2300 1752 7b1c0139de262799dca2bb054e3db974.exe 30 PID 1752 wrote to memory of 2300 1752 7b1c0139de262799dca2bb054e3db974.exe 30 PID 1752 wrote to memory of 2300 1752 7b1c0139de262799dca2bb054e3db974.exe 30 PID 1752 wrote to memory of 2300 1752 7b1c0139de262799dca2bb054e3db974.exe 30 PID 2300 wrote to memory of 1844 2300 COM2.EXE 31 PID 2300 wrote to memory of 1844 2300 COM2.EXE 31 PID 2300 wrote to memory of 1844 2300 COM2.EXE 31 PID 2300 wrote to memory of 1844 2300 COM2.EXE 31 PID 824 wrote to memory of 1172 824 IUB.EXE 33 PID 824 wrote to memory of 1172 824 IUB.EXE 33 PID 824 wrote to memory of 1172 824 IUB.EXE 33 PID 824 wrote to memory of 1172 824 IUB.EXE 33 PID 2300 wrote to memory of 2052 2300 COM2.EXE 34 PID 2300 wrote to memory of 2052 2300 COM2.EXE 34 PID 2300 wrote to memory of 2052 2300 COM2.EXE 34 PID 2300 wrote to memory of 2052 2300 COM2.EXE 34 PID 2300 wrote to memory of 860 2300 COM2.EXE 35 PID 2300 wrote to memory of 860 2300 COM2.EXE 35 PID 2300 wrote to memory of 860 2300 COM2.EXE 35 PID 2300 wrote to memory of 860 2300 COM2.EXE 35 PID 2300 wrote to memory of 2868 2300 COM2.EXE 39 PID 2300 wrote to memory of 2868 2300 COM2.EXE 39 PID 2300 wrote to memory of 2868 2300 COM2.EXE 39 PID 2300 wrote to memory of 2868 2300 COM2.EXE 39 PID 2300 wrote to memory of 2948 2300 COM2.EXE 41 PID 2300 wrote to memory of 2948 2300 COM2.EXE 41 PID 2300 wrote to memory of 2948 2300 COM2.EXE 41 PID 2300 wrote to memory of 2948 2300 COM2.EXE 41 PID 824 wrote to memory of 1868 824 IUB.EXE 43 PID 824 wrote to memory of 1868 824 IUB.EXE 43 PID 824 wrote to memory of 1868 824 IUB.EXE 43 PID 824 wrote to memory of 1868 824 IUB.EXE 43 PID 2300 wrote to memory of 2568 2300 COM2.EXE 44 PID 2300 wrote to memory of 2568 2300 COM2.EXE 44 PID 2300 wrote to memory of 2568 2300 COM2.EXE 44 PID 2300 wrote to memory of 2568 2300 COM2.EXE 44 PID 1172 wrote to memory of 1792 1172 SVCHOSI.EXE 45 PID 1172 wrote to memory of 1792 1172 SVCHOSI.EXE 45 PID 1172 wrote to memory of 1792 1172 SVCHOSI.EXE 45 PID 1172 wrote to memory of 1792 1172 SVCHOSI.EXE 45 PID 1172 wrote to memory of 1048 1172 SVCHOSI.EXE 46 PID 1172 wrote to memory of 1048 1172 SVCHOSI.EXE 46 PID 1172 wrote to memory of 1048 1172 SVCHOSI.EXE 46 PID 1172 wrote to memory of 1048 1172 SVCHOSI.EXE 46 PID 1172 wrote to memory of 888 1172 SVCHOSI.EXE 47 PID 1172 wrote to memory of 888 1172 SVCHOSI.EXE 47 PID 1172 wrote to memory of 888 1172 SVCHOSI.EXE 47 PID 1172 wrote to memory of 888 1172 SVCHOSI.EXE 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b1c0139de262799dca2bb054e3db974.exe"C:\Users\Admin\AppData\Local\Temp\7b1c0139de262799dca2bb054e3db974.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\$Tmp~12026\IUB.EXEC:\Users\Admin\AppData\Local\Temp\$Tmp~12026\IUB.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\$Tmp~12026\ashsvc.exeC:\Users\Admin\AppData\Local\Temp\$Tmp~12026\ashsvc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2840
-
-
C:\Windows\SysWOW64\SVCHOSI.EXEC:\Windows\System32\SVCHOSI.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\$Tmp~12026\IUB.EXEC:\Users\Admin\AppData\Local\Temp\$Tmp~12026\IUB.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1792
-
-
C:\COM2.EXE\\.\C:\COM2.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1048
-
-
C:\Users\Admin\AppData\Local\Temp\$Tmp~12026\IUB.EXEC:\Users\Admin\AppData\Local\Temp\$Tmp~12026\IUB.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:888
-
-
-
C:\Users\Admin\AppData\Local\Temp\$Tmp~12026\COM1.EXE\\.\C:\Users\Admin\AppData\Local\Temp\$Tmp~12026\COM1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1868
-
-
-
C:\COM2.EXE\\.\C:\COM2.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\REG.exeREG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /v NTLOADER REG_SZ /d "C:\COM2.EXE"3⤵
- Modifies registry key
PID:1844
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /v WinSix /t REG_SZ /d "C:\Windows\System32\SVCHOSI.EXE"3⤵
- Adds Run key to start application
- Modifies registry key
PID:2052
-
-
C:\Windows\SysWOW64\SVCHOSI.EXEC:\Windows\System32\SVCHOSI.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:860
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\CabinetState /f /v FullPath /t REG_DWORD /d 13⤵
- Modifies registry key
PID:2868
-
-
C:\Windows\SysWOW64\REG.exeREG ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\CabinetState /f /v FullPath /t REG_DWORD /d 13⤵
- Modifies registry key
PID:2948
-
-
C:\Windows\SysWOW64\2026\2045\ashsvc.exeC:\Windows\System32\2026\2045\ashsvc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD585f4bd80730b5e3856f046e8ac6ac3d5
SHA160e2bd8b141e501271e36e1db9d1b020892de195
SHA25672c65a5147bad53ac7eb04b1364bbaf7274f58ea25c5f12eb76429ff58aaff38
SHA51218628fa996c39186ec432d9ec0df121229e86f722d08704d4ebcb4d4362523b59f26ec944517d9d8fffe1cbcbd2899ee9da377b8dbc67efe4537442227696056
-
Filesize
192KB
MD55229d45c1e19fb00ecca5c4d47681147
SHA1787ce9f6f0fdc36a2b2efa0ef4298d7bba66338d
SHA25619617fb03fc3a50d43626ed3e0972fb7618d2eccde09c1a97e57b36a775797e6
SHA512d3db25dfde5831ce46310db2156f4806b32c0090ced71086f61dcc45eb7c436e341c31e6feb657859364ad258d67713a85dfb9569b389736b45de7f27ae8bb81
-
Filesize
1.1MB
MD5fb4393a6f32949ebefde8ecf0ccb2250
SHA166063ec8342b0dab6349ee60371469395a7f661f
SHA256f23905603c36d65868f650bee544442e7396f9e8913adec54bcb21b3e3c204b3
SHA512c2aea768425810589b2984fe9912a77b0d3acaa6d01ad2b1ed2737bbd9435d0440d0ab029492ee89676413028f330a92189f1ccb0bc459406c10b87bcc3d36c5
-
Filesize
1.0MB
MD5f096790c165816d6483d3ee48e3bdb5c
SHA11cff454904b6e78a0bf05f6f30ced757fd76bb77
SHA25622de0977c69907c7e8e902c39532d2ea5cddc8f79dd5e68a9e79af92e886c1c3
SHA512b71435a9e724d50a08765cad9a01d84c23d1bbc3b01efd002a76ae3bd911f04b0bb9307ca190e9d2677dbb3ecf8239508d7308818dae0315abd58b104c5bcaac
-
Filesize
123KB
MD5b675ee05d26e1dff60042812295612c3
SHA1f1ae5e80d6d566f5b9d271e3f55eb03aa6ac5ff2
SHA25658e2182470fd000cc057e8b11d6f4f746ea1f5d9d70730b47b475ae5b31996e4
SHA512c5b63b00d83b3eb7b35b285efbf8841c18c856f535de2b5a424ad769d822fda0b346d15d4f15d2ea6b3ed2119f75c077fe3d6d67d7108896212f1353907f6fb2
-
Filesize
1.1MB
MD5eb3b0297f64c492e1420abc42b90505d
SHA1bab7a139d82223b8d93cbb58e728c942a468de08
SHA256d285c312349206c9b70be8ab7a08ecb48dab546559f106451502eb2fa2b8daeb
SHA51226763937ea3b8b4dff2340068aade84b1db52bb7af068eb6db70ca3ff14cc02d96c88793327cb91553bc17f95912df477e6a13fbc32d43ebe2a46322e3a44e48
-
Filesize
1022KB
MD5b4d47cb0965db279e61b18725d888184
SHA1e37b174779b6809f8acac7ad9f315a3eee338d03
SHA2562b7b9cf024b6f9842571c551e09868a1f3ce36dfdc125edd5e0454770c50232a
SHA5128b06c8ea1a6ccea9bfe1ce35597ec70fa8cc4e6721261483e1ea98a093045ba15994ceb686cee8a898bf3925beb3ce94bb86f4ab14c9416800f3ce68afc7b211
-
Filesize
125KB
MD5b33db6ac948c4b6e8d0e5c082b9a303a
SHA1261fd70fb578503c770d0aaccc4fb861cf9ce7fe
SHA256b50406caf4b61ca379c6408631d4916f33b87efd3d5f23fb9a7433dd4ff78121
SHA51224123ecb50205122dbaf595822a5165e2eb370c78bea45122ef1af95c128ced2f1834a5e3d301047bf62bf104cf7038e8e47fa5b926c28f4b29406cdfac17045
-
Filesize
335KB
MD55e42ebce0bc9bdddd07c4974dc3be872
SHA1004da4d302a2c12d0bf18dfe683215e1777144d8
SHA256139e67cb8fca4786544de66bf933d997164dc5b9feffc24e39454f28a595e6e7
SHA512791a1c55a21f5466c10ee522beb9dfa17061112a45a9612b6489afa7501f8742ffcaefcae0c1c46a33535953b29813b58ab2598bca399ea9ce66cef753682a14
-
Filesize
472KB
MD5a2a5983abb4dfd55beff352d92ccc0aa
SHA181be06828eb0d20dc9f67c272d74f1dcf78e6e0c
SHA2560a37d1ae51f1114df1870d85923a19c2fd0f9589096218ff78cf09728aadb094
SHA512b758d5ca7ad82235bb7d7ba7e1a26e896d0ebdd5eb9b5faa04c3d4712abbbc50664ada4ef637eea28ed4de162af9e4d6c150ef52d2288b5bca89d780efbbc544
-
Filesize
540KB
MD52b8e348b96cf33e11e6d296a0582b2a5
SHA19fb9182dbfa28e66facee630dab12b4c39956116
SHA256bcfad82c9266c08c0ae5765a84cb5044350b17a89f2c563d44ffa888542c5bb2
SHA512288b8c985fbcff8050a278eda74a1464f049970079b6b2e8891cb774954f455dccbaed2257c75a1c3fe58af5d1454abbb99dc7cfa1c318f89e0a439ba9daafdf
-
Filesize
470KB
MD5ecfba06eb4c18bd6502c33286d3d16ba
SHA1303faa2726de6ba77b10390dca916dd2e68e9be6
SHA25646e1b8f77bca075bf84332f61d59cfffb564a8e21c92cd3a7f96ba7014510fd5
SHA512560721d4645e37479e6d807c2293110b0f3763201a26cc3f018cb11d31b49344049400c4a4aeaa2d6b1fc37d62d381ac0b668c37959d2ae6349b0d1eda3d72e8
-
Filesize
128KB
MD58abbee658622f1d39a527bab3afb44a6
SHA158632f8baa0be99cf1fd9968a6972b8d11dead34
SHA2562bcbc4215348f912bc906a49aef19370b3656d3cb2010409cdc7274caa92e703
SHA5121095c33e7504eece199b11caccd872e5f1732c666af7359e9a629f1f601e3b231a77c9b03f3b1ceb02b2f42052dbb9e32ef0d5d464fb7be8a9a725e7a2f2bc0c
-
Filesize
768KB
MD5fae52700246649eb4d1eed1ca4f8eb5d
SHA1f177aa3fd4a0d22e08627930b0d9a80949f35aec
SHA2561d6ec2a9a31467332bc83f4555b83eea8cedfb7d56a4985a75755de588176dc8
SHA512c31b9a090d75d2f1f338fb6b7e6fe08bf41aadd1eaf35d74e3474331dbe8d8a8418d43b504b5c060d1f2659546c56b81ce51d4ca61672c0bd98983501f73738c
-
Filesize
500KB
MD5d5d57764b1de576e0d972b5ffff3e153
SHA1bb9107f56f5370189fb68b0f5a54368bb74940b6
SHA25670feca00dd88646c9c7e2d7793e8b35921773b2616fdf7241461074941526e82
SHA5125752ab68026969ed47d8de99835eb9501416c0a2f9b98205b550429fcb3819374c68d67cf15764366dd418bcc98c2dae0c0baab7d7c2b0fcbb26f7b2a1546abd
-
Filesize
705KB
MD5de65f05285e4c52a230ff7e04ea7ac45
SHA194b2a6e8080a77a8479f3e4e71c8ad67e40a119c
SHA256a6491b88e8a6b6d4fc677635d241b03b7daae84d84d655a8121563d39021efbe
SHA5120873f9b36279439892318efb49dad33b7679c197e23fef2b0e1ac63126dceeaa0694f8bbb12bbce7401359938359f00a84f595c76a10250f7e3d4ec796007eba
-
Filesize
76KB
MD5727d2c26fc3b085959b068004bea77bc
SHA1871575d9bbe6bc710f384b532648cf32177d1667
SHA256a9ef8e216173c342b16de1bc9a0d0ceba0c9d7bb6e8c1a4417a1bfe2a408e462
SHA512175777a973bd267525914905023bce60f5b3de65654770e320e76f4d41e78dcb7b45b9bf45e242101a841a151789c39d52aa2ed49e28b5a961ede535ada16d95
-
Filesize
1.1MB
MD5eddb59614182dcb08c89bdc3e4329d63
SHA10b7c7db1bed84a648fa26a786ff677500fad7953
SHA256e011727d7707effe714a6da39ff8999e7f15234f69bca19ef238406e1745f5d5
SHA512896dd0553add9459703914d4a30225af25e8c0ad45d8b0466ba121734bd651b2ec041817b727ab28559562aa5c7cb57c2136843508b5df62c5d845c3533c62b0
-
Filesize
494KB
MD5198d065bd0714482011917307c9ebf46
SHA1b834c8a5396e59b0fd051dda8849cf9b999aa625
SHA256acee024120921b1f406d6d7f6d5facf054083ab55993ce4c1ba5ebd6595c7e43
SHA512489d38aee5d95a9611aff4b170113250d1608e9dc3f496f73018e9980de91f30e58edec0e37d4468f093867d5848044136b0934ee35345daa5a63c73b3e96120
-
Filesize
117KB
MD5c1afdf88451258af208c2eaf90a3e074
SHA1cc3473b7949e631c4ca0bec21d9430e34e310f2f
SHA256295331b60026555ea5f27f0e87d5b9d90a5c5fedb656c945d80a3470d4851cc8
SHA512768330c2bc3ec9ac6803532d833200569442fc5d95193562d8811695b649400eba2ea8166d4f7806a7d9bf6ffbd80c74983f5d05d6698b8f877796f542913609
-
Filesize
1016KB
MD566cb8945862bc54791d51c48d3933af1
SHA1edeb377a60400506c009b1a1c974005652392184
SHA25623e422d24a432798b8e68a62332a61f4f2920964c46693549c3de1b08189e920
SHA512e93382ce917df9b5e1c8eece50a3ce8ef1aece52c4bd5d9eef0b037bf81cf41b899631a848d0125c15a6eb43447ba1d736fa946d704ccea8e61d3681b2c87f2c
-
Filesize
923KB
MD59eef0d79e71b24d68b8c7acf683beb7b
SHA1cde728e30a7c425274a40f8087123a1beab7dff4
SHA25633e980a56f4e32377934192f2e0c6834578160160bb5586a1e5c657904687478
SHA512ecd3873675f89a5bada0ab019ed5d8f7e05341efc91b22102dba03a4291d7836ae73558cdae38fa8577249038349c7b25955a7e4adf63cc3fdb5796abe874f24
-
Filesize
1.1MB
MD57537aa3e29f28d9620eb2a9fe7f00bfb
SHA17e9782d41c20a92fd771bbc7d23bb5a82b2c9009
SHA256a074b4744dc4d1bce43c87980f68ce9fe6a3ea606bd67f13efea3bf41994513a
SHA5128b84c724901ad3c07b90747e3d22337da2f2157efcc106378097c987d08dea88d0b8dfdba950f4479e8152162fd0bafd70f8996fa0cb57f1e2ba8d1ca01b3c37