Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe
Resource
win10v2004-20240802-en
General
-
Target
4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe
-
Size
136KB
-
MD5
6bd742efe069b7307aee8cdedb07df10
-
SHA1
b82c54954267280e4da57b2333e6065504e95e93
-
SHA256
4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2
-
SHA512
fa074eab297cc960711b29cf7939757eccb0037b52f989ed97d138f03e6ceb0db15ffecbb55937d871f710ca6f2dbf9f576d5ce64c3d500d518825cd15230f4a
-
SSDEEP
3072:Rj8JZHnLOfBCgc1gsohLwdNbw+Y92xQuohLwdNbw5bxH0zVWccA:Rj+ZHnLOZxigsohxd2Quohdbd0zscj
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dmgbnq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Deokon32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daekdooc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dkkcge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhocqigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmgbnq32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dknpmdfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dknpmdfc.exe -
Executes dropped EXE 7 IoCs
pid Process 4116 Dmgbnq32.exe 5068 Deokon32.exe 2848 Dkkcge32.exe 3972 Daekdooc.exe 3024 Dhocqigp.exe 1224 Dknpmdfc.exe 2856 Dmllipeg.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File created C:\Windows\SysWOW64\Amfoeb32.dll Dmgbnq32.exe File created C:\Windows\SysWOW64\Dknpmdfc.exe Dhocqigp.exe File created C:\Windows\SysWOW64\Jcbdhp32.dll Deokon32.exe File opened for modification C:\Windows\SysWOW64\Dhocqigp.exe Daekdooc.exe File created C:\Windows\SysWOW64\Elkadb32.dll Daekdooc.exe File opened for modification C:\Windows\SysWOW64\Dknpmdfc.exe Dhocqigp.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe File created C:\Windows\SysWOW64\Kngpec32.dll Dknpmdfc.exe File created C:\Windows\SysWOW64\Dmgbnq32.exe 4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe File opened for modification C:\Windows\SysWOW64\Dmgbnq32.exe 4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe File opened for modification C:\Windows\SysWOW64\Daekdooc.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Dhocqigp.exe Daekdooc.exe File opened for modification C:\Windows\SysWOW64\Dkkcge32.exe Deokon32.exe File created C:\Windows\SysWOW64\Daekdooc.exe Dkkcge32.exe File created C:\Windows\SysWOW64\Ohmoom32.dll Dkkcge32.exe File created C:\Windows\SysWOW64\Nokpao32.dll Dhocqigp.exe File created C:\Windows\SysWOW64\Ihidnp32.dll 4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe File created C:\Windows\SysWOW64\Deokon32.exe Dmgbnq32.exe File opened for modification C:\Windows\SysWOW64\Deokon32.exe Dmgbnq32.exe File created C:\Windows\SysWOW64\Dkkcge32.exe Deokon32.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Dknpmdfc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 440 2856 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmgbnq32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deokon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dkkcge32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daekdooc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhocqigp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dknpmdfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ihidnp32.dll" 4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Dknpmdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jcbdhp32.dll" Deokon32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohmoom32.dll" Dkkcge32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nokpao32.dll" Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amfoeb32.dll" Dmgbnq32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dkkcge32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dknpmdfc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dmgbnq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Deokon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elkadb32.dll" Daekdooc.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4412 wrote to memory of 4116 4412 4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe 82 PID 4412 wrote to memory of 4116 4412 4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe 82 PID 4412 wrote to memory of 4116 4412 4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe 82 PID 4116 wrote to memory of 5068 4116 Dmgbnq32.exe 83 PID 4116 wrote to memory of 5068 4116 Dmgbnq32.exe 83 PID 4116 wrote to memory of 5068 4116 Dmgbnq32.exe 83 PID 5068 wrote to memory of 2848 5068 Deokon32.exe 84 PID 5068 wrote to memory of 2848 5068 Deokon32.exe 84 PID 5068 wrote to memory of 2848 5068 Deokon32.exe 84 PID 2848 wrote to memory of 3972 2848 Dkkcge32.exe 85 PID 2848 wrote to memory of 3972 2848 Dkkcge32.exe 85 PID 2848 wrote to memory of 3972 2848 Dkkcge32.exe 85 PID 3972 wrote to memory of 3024 3972 Daekdooc.exe 86 PID 3972 wrote to memory of 3024 3972 Daekdooc.exe 86 PID 3972 wrote to memory of 3024 3972 Daekdooc.exe 86 PID 3024 wrote to memory of 1224 3024 Dhocqigp.exe 87 PID 3024 wrote to memory of 1224 3024 Dhocqigp.exe 87 PID 3024 wrote to memory of 1224 3024 Dhocqigp.exe 87 PID 1224 wrote to memory of 2856 1224 Dknpmdfc.exe 88 PID 1224 wrote to memory of 2856 1224 Dknpmdfc.exe 88 PID 1224 wrote to memory of 2856 1224 Dknpmdfc.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe"C:\Users\Admin\AppData\Local\Temp\4f7e5ad566c9096701f58a6c59d2b33c704a002151241a0d4418bda33e6ae0c2N.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\Dmgbnq32.exeC:\Windows\system32\Dmgbnq32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\Deokon32.exeC:\Windows\system32\Deokon32.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\Dkkcge32.exeC:\Windows\system32\Dkkcge32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\Daekdooc.exeC:\Windows\system32\Daekdooc.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\Dhocqigp.exeC:\Windows\system32\Dhocqigp.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\Dknpmdfc.exeC:\Windows\system32\Dknpmdfc.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 3969⤵
- Program crash
PID:440
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2856 -ip 28561⤵PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD51834128e4461a8b35ccdc660556a60e3
SHA127c996deef1d78232ffe9af6a18a40bb014f6f82
SHA2569f8c74218ce6573052f760499c5960318751a12ffb1305ef84b360c5f1076aa3
SHA5121eed28bd3e9af26f67674f2ad862fe045242de7fda8f093dd2727932980ad81199e981cea47f89434f480117a3bc3e866edd13fc3837c056f63af382c18ca9aa
-
Filesize
136KB
MD57f2d3bcecf6a9b9e434303cc893d0455
SHA1fbcf581b03ce56af85e4c81fd9ebdc5512ef4ba8
SHA2568c36d3209e3440429c32bd7fd7fcb1cdbbfc88dace7db00e0f466893e14fa43f
SHA5127fbf0210c6e31a9f2d194bee3b1d5d7403ea98d26b893a129701ead87f1ac631e43ccf0378830ef46fd143f0ac4a520e9062ac4091b4f2c810c2e43915cafc7a
-
Filesize
136KB
MD5b3d25758f3e6a6477952559848bffc06
SHA14d00539e15c27b2a3ee40aa2000354c554a19600
SHA2569641be103ae16399a8ea3fbf11ff5a23f2da675f96675c46b4c983c13e9dbfcf
SHA5129e7718c4037a72e66c6f17edd718521c58af7bb9aacf08c4c4d8664f4661c4b25f7a9079dbe2ede720cb6f1d9e2cbbd60ede23dd6dc27a27f33c8686b756f717
-
Filesize
136KB
MD5827e3a1dea841c849259eaa1a82fd673
SHA14c339eda4ee47cf668ffda59bceaea3ae3e481d8
SHA256fb30de815f02f892b3558bf6112ecbe60a1a334bc5ccaf47f523e162d4971f16
SHA512294a7f77c5023da9cf9d37dce0a7bb34a4c6c151b0869009ba335a9111523ecdf227715a0261ee4f15296910f1259d01baabbae4b2b740500b57248d1319ece2
-
Filesize
136KB
MD516e9a5e2c5ba2ee57a95889a35c800bc
SHA1006c7101b238301a7a6f24f6a449c83d3f7fa3c4
SHA256694cda93337cd740500df9ed06ec5f9317399050de50fc15be383039b7fe636d
SHA512d9400962b6ce00cdb282bc4f8ef5b01dee7e508f58b64dbacf6809dc3c24d1c3910ce7d7105875e1af6bc400a56a4e3b451ace78caec0d49bc7508e0866e7ef3
-
Filesize
136KB
MD515e5e64269e9c0de1b67adc8f407924a
SHA1bb68a55f1f6c18e780f3736ccb40053ecd32dd81
SHA256a8e6bcb507efd8aa50912415b2ae8ed1d4f0f6da41382faddc26995a77d8c115
SHA5125b407f661d9329e4bd0d6f01fade82e2b31f47cb1903e5016fd7b86a7ae98c9a36e2051557f3b4693ab650229092dfc4896bdee7ffffa0c81e7e4f854c7f8a3c
-
Filesize
136KB
MD5eeefcad7f8f79b8d5e8b14a258f36db9
SHA12ef6ee468969ebef204ff78ac2c4c34de2ed52bd
SHA2569df049c7eae3623059e08f413aab6b048ceca7b5a3e7b36cb170be2151f811ae
SHA5122f4cc223a3e8ef663a1d2731de95ff5b05c216ccf81ac1c61115eb4d741b5b1249248cf3d6efecabd74c92cadd3630f3025787fca27413942a56bf570dc7302b