Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe
Resource
win10v2004-20221111-en
General
-
Target
ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe
-
Size
601KB
-
MD5
f4910d24dff827341eba3e0875fe59ba
-
SHA1
7e16b37698385d3a97d21c0ae5c49ba34d8b17ca
-
SHA256
ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68
-
SHA512
d03ca9b6c34cac7fad5675ff894af3ec7bb60918984bec4b60b70cf79d0d103cf19a1299d042240e9279bbeeb173557871d8a74c730f36093dcefbbdd77c59e5
-
SSDEEP
12288:nIny5DYT3G2C5XuWlR7QqP9B3kWzyqF+3lk7H84o1z6Vq46TF2dx370:vUT22CluWlR7QS9B3LzwC7HvO+BCF2d6
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe -
Executes dropped EXE 5 IoCs
pid Process 260 installd.exe 5024 nethtsrv.exe 2916 netupdsrv.exe 1116 nethtsrv.exe 3164 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 260 installd.exe 5024 nethtsrv.exe 5024 nethtsrv.exe 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 1116 nethtsrv.exe 1116 nethtsrv.exe 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\installd.exe ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe File created C:\Windows\SysWOW64\nethtsrv.exe ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe File created C:\Windows\SysWOW64\netupdsrv.exe ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe File created C:\Windows\SysWOW64\hfnapi.dll ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe File created C:\Windows\SysWOW64\hfpapi.dll ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1116 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3436 wrote to memory of 1716 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 83 PID 3436 wrote to memory of 1716 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 83 PID 3436 wrote to memory of 1716 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 83 PID 1716 wrote to memory of 3228 1716 net.exe 85 PID 1716 wrote to memory of 3228 1716 net.exe 85 PID 1716 wrote to memory of 3228 1716 net.exe 85 PID 3436 wrote to memory of 2592 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 86 PID 3436 wrote to memory of 2592 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 86 PID 3436 wrote to memory of 2592 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 86 PID 2592 wrote to memory of 3196 2592 net.exe 88 PID 2592 wrote to memory of 3196 2592 net.exe 88 PID 2592 wrote to memory of 3196 2592 net.exe 88 PID 3436 wrote to memory of 260 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 89 PID 3436 wrote to memory of 260 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 89 PID 3436 wrote to memory of 260 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 89 PID 3436 wrote to memory of 5024 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 90 PID 3436 wrote to memory of 5024 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 90 PID 3436 wrote to memory of 5024 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 90 PID 3436 wrote to memory of 2916 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 92 PID 3436 wrote to memory of 2916 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 92 PID 3436 wrote to memory of 2916 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 92 PID 3436 wrote to memory of 1912 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 94 PID 3436 wrote to memory of 1912 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 94 PID 3436 wrote to memory of 1912 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 94 PID 1912 wrote to memory of 980 1912 net.exe 98 PID 1912 wrote to memory of 980 1912 net.exe 98 PID 1912 wrote to memory of 980 1912 net.exe 98 PID 3436 wrote to memory of 2068 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 101 PID 3436 wrote to memory of 2068 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 101 PID 3436 wrote to memory of 2068 3436 ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe 101 PID 2068 wrote to memory of 4972 2068 net.exe 103 PID 2068 wrote to memory of 4972 2068 net.exe 103 PID 2068 wrote to memory of 4972 2068 net.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe"C:\Users\Admin\AppData\Local\Temp\ff6b4295629cd50bc3a9ccf5cbdb9bc00f28ef1d80f288a6ae2694f6f31fcc68.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:3228
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:3196
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:260
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5024
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:2916
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:980
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:4972
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:3164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5b0855bb81361a44e1c4361f6b46e7c62
SHA14d9e70e40cb1c8a471c7a46804a7888414c1c5da
SHA256276c010f08d380e4aa8bd6545472467a3f8432e63bcf231e67500861cf1b6560
SHA5127e1093aca8d51f0d15acf217d91a698b842b5951f31442444a9d5b5e5307a8106d774f0d99246db13c8435b2fc1ab6b1e3dbc12daa98491798a40de5e1ffdccd
-
Filesize
106KB
MD5b0855bb81361a44e1c4361f6b46e7c62
SHA14d9e70e40cb1c8a471c7a46804a7888414c1c5da
SHA256276c010f08d380e4aa8bd6545472467a3f8432e63bcf231e67500861cf1b6560
SHA5127e1093aca8d51f0d15acf217d91a698b842b5951f31442444a9d5b5e5307a8106d774f0d99246db13c8435b2fc1ab6b1e3dbc12daa98491798a40de5e1ffdccd
-
Filesize
106KB
MD5b0855bb81361a44e1c4361f6b46e7c62
SHA14d9e70e40cb1c8a471c7a46804a7888414c1c5da
SHA256276c010f08d380e4aa8bd6545472467a3f8432e63bcf231e67500861cf1b6560
SHA5127e1093aca8d51f0d15acf217d91a698b842b5951f31442444a9d5b5e5307a8106d774f0d99246db13c8435b2fc1ab6b1e3dbc12daa98491798a40de5e1ffdccd
-
Filesize
106KB
MD5b0855bb81361a44e1c4361f6b46e7c62
SHA14d9e70e40cb1c8a471c7a46804a7888414c1c5da
SHA256276c010f08d380e4aa8bd6545472467a3f8432e63bcf231e67500861cf1b6560
SHA5127e1093aca8d51f0d15acf217d91a698b842b5951f31442444a9d5b5e5307a8106d774f0d99246db13c8435b2fc1ab6b1e3dbc12daa98491798a40de5e1ffdccd
-
Filesize
241KB
MD5c14bf6131407917726302a0172f8ce8d
SHA1d284c8cd5c6093b71b3c3bd2cf7b9587da42069d
SHA256712495ff70d3181b1fc0a851f9cef54256ba52282e20ced9196e3246136ce61a
SHA5129f0deafd6ec5991c49e4f2229dd873422ea1c158861dae4e972d31b0a1005fbb6f140393f3ad506f1d63718a5947f6417f0c1ca5acaf61f6cbc0edcaf1e55d9e
-
Filesize
241KB
MD5c14bf6131407917726302a0172f8ce8d
SHA1d284c8cd5c6093b71b3c3bd2cf7b9587da42069d
SHA256712495ff70d3181b1fc0a851f9cef54256ba52282e20ced9196e3246136ce61a
SHA5129f0deafd6ec5991c49e4f2229dd873422ea1c158861dae4e972d31b0a1005fbb6f140393f3ad506f1d63718a5947f6417f0c1ca5acaf61f6cbc0edcaf1e55d9e
-
Filesize
241KB
MD5c14bf6131407917726302a0172f8ce8d
SHA1d284c8cd5c6093b71b3c3bd2cf7b9587da42069d
SHA256712495ff70d3181b1fc0a851f9cef54256ba52282e20ced9196e3246136ce61a
SHA5129f0deafd6ec5991c49e4f2229dd873422ea1c158861dae4e972d31b0a1005fbb6f140393f3ad506f1d63718a5947f6417f0c1ca5acaf61f6cbc0edcaf1e55d9e
-
Filesize
108KB
MD5ba1f55239ad943062eff1840a87109ed
SHA110d2f27c6d054fe958e21d9a9eec37f831a74ab9
SHA25675b84e64bf1558bab67a66b36830cfc2eb122eec4d55691d601832d706f6b1f7
SHA512fdb7c0dc6f67bced54bd0b5867e0c7b64a754f7bb59249ed849cca2937432bc3349e934506745fed70ce0b0bbc02be87318fcbb377411612df915637f5f07c1c
-
Filesize
108KB
MD5ba1f55239ad943062eff1840a87109ed
SHA110d2f27c6d054fe958e21d9a9eec37f831a74ab9
SHA25675b84e64bf1558bab67a66b36830cfc2eb122eec4d55691d601832d706f6b1f7
SHA512fdb7c0dc6f67bced54bd0b5867e0c7b64a754f7bb59249ed849cca2937432bc3349e934506745fed70ce0b0bbc02be87318fcbb377411612df915637f5f07c1c
-
Filesize
176KB
MD5392f7f2e5ef135a1ccfd7f787e3b04ce
SHA1d484574828a4d430c962dc53cb17b4678f2b8c14
SHA25603468330152d82632ac9d640acc79253cb80dff5c6c8fb3ae9545b6aa83329c4
SHA5126397433c3a1a64bdd07d3487f4da14d9f06b08d4303bebe856c08565defd1302e4905e85cfebc0dddeb0687a62350f050139c5fdf9afca089e7eb432dd6c1efb
-
Filesize
176KB
MD5392f7f2e5ef135a1ccfd7f787e3b04ce
SHA1d484574828a4d430c962dc53cb17b4678f2b8c14
SHA25603468330152d82632ac9d640acc79253cb80dff5c6c8fb3ae9545b6aa83329c4
SHA5126397433c3a1a64bdd07d3487f4da14d9f06b08d4303bebe856c08565defd1302e4905e85cfebc0dddeb0687a62350f050139c5fdf9afca089e7eb432dd6c1efb
-
Filesize
176KB
MD5392f7f2e5ef135a1ccfd7f787e3b04ce
SHA1d484574828a4d430c962dc53cb17b4678f2b8c14
SHA25603468330152d82632ac9d640acc79253cb80dff5c6c8fb3ae9545b6aa83329c4
SHA5126397433c3a1a64bdd07d3487f4da14d9f06b08d4303bebe856c08565defd1302e4905e85cfebc0dddeb0687a62350f050139c5fdf9afca089e7eb432dd6c1efb
-
Filesize
158KB
MD5e222505f36dbc9f0e3449451cd652ee8
SHA1debe08c111e32fe9194da92db9742e7e529696d3
SHA25660fdc2b655dfa17f42eeadef9fb3d85c08ca472d9631ed4f570e57c4e63ddb9f
SHA512ba8f43495b001fd40b74512dff4fb4834932e3eb4d5c18666022cb358f13f54eb308d0fc47b4b040935108d040a7f14377724d1e422460ff409a2895abdfa24c
-
Filesize
158KB
MD5e222505f36dbc9f0e3449451cd652ee8
SHA1debe08c111e32fe9194da92db9742e7e529696d3
SHA25660fdc2b655dfa17f42eeadef9fb3d85c08ca472d9631ed4f570e57c4e63ddb9f
SHA512ba8f43495b001fd40b74512dff4fb4834932e3eb4d5c18666022cb358f13f54eb308d0fc47b4b040935108d040a7f14377724d1e422460ff409a2895abdfa24c
-
Filesize
158KB
MD5e222505f36dbc9f0e3449451cd652ee8
SHA1debe08c111e32fe9194da92db9742e7e529696d3
SHA25660fdc2b655dfa17f42eeadef9fb3d85c08ca472d9631ed4f570e57c4e63ddb9f
SHA512ba8f43495b001fd40b74512dff4fb4834932e3eb4d5c18666022cb358f13f54eb308d0fc47b4b040935108d040a7f14377724d1e422460ff409a2895abdfa24c