Analysis
-
max time kernel
146s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:08
Static task
static1
Behavioral task
behavioral1
Sample
f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe
Resource
win10v2004-20221111-en
General
-
Target
f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe
-
Size
602KB
-
MD5
cbeabe8c79fc1d2c9642c15d5c372174
-
SHA1
6c4ae8b3b8b51008a29554063b940cd60191a021
-
SHA256
f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5
-
SHA512
8626ef90ceda9318701dc59de58c41cdffa7cd270a772b9181b4c7878aa13f8c9b2678ae3cb19555ec63da020843098b1e9153e6f8c99a12a5eb32224f3fe0e1
-
SSDEEP
12288:NIny5DYTbPFXbr2G08cX3bAKOP4hA9hcDD:ZUTbNrr68+LDOiE
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 3372 installd.exe 1092 nethtsrv.exe 3748 netupdsrv.exe 3788 nethtsrv.exe 4688 netupdsrv.exe -
Loads dropped DLL 14 IoCs
Processes:
f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exeinstalld.exenethtsrv.exenethtsrv.exepid process 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe 3372 installd.exe 1092 nethtsrv.exe 1092 nethtsrv.exe 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe 3788 nethtsrv.exe 3788 nethtsrv.exe 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exedescription ioc process File created C:\Windows\SysWOW64\netupdsrv.exe f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe File created C:\Windows\SysWOW64\hfnapi.dll f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe File created C:\Windows\SysWOW64\hfpapi.dll f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe File created C:\Windows\SysWOW64\installd.exe f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe File created C:\Windows\SysWOW64\nethtsrv.exe f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe -
Drops file in Program Files directory 3 IoCs
Processes:
f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\data.xml f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
Processes:
nethtsrv.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 660 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 3788 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exenet.exenet.exenet.exenet.exedescription pid process target process PID 224 wrote to memory of 4740 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe net.exe PID 224 wrote to memory of 4740 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe net.exe PID 224 wrote to memory of 4740 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe net.exe PID 4740 wrote to memory of 5080 4740 net.exe net1.exe PID 4740 wrote to memory of 5080 4740 net.exe net1.exe PID 4740 wrote to memory of 5080 4740 net.exe net1.exe PID 224 wrote to memory of 5076 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe net.exe PID 224 wrote to memory of 5076 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe net.exe PID 224 wrote to memory of 5076 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe net.exe PID 5076 wrote to memory of 1828 5076 net.exe net1.exe PID 5076 wrote to memory of 1828 5076 net.exe net1.exe PID 5076 wrote to memory of 1828 5076 net.exe net1.exe PID 224 wrote to memory of 3372 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe installd.exe PID 224 wrote to memory of 3372 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe installd.exe PID 224 wrote to memory of 3372 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe installd.exe PID 224 wrote to memory of 1092 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe nethtsrv.exe PID 224 wrote to memory of 1092 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe nethtsrv.exe PID 224 wrote to memory of 1092 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe nethtsrv.exe PID 224 wrote to memory of 3748 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe netupdsrv.exe PID 224 wrote to memory of 3748 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe netupdsrv.exe PID 224 wrote to memory of 3748 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe netupdsrv.exe PID 224 wrote to memory of 5008 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe net.exe PID 224 wrote to memory of 5008 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe net.exe PID 224 wrote to memory of 5008 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe net.exe PID 5008 wrote to memory of 4588 5008 net.exe net1.exe PID 5008 wrote to memory of 4588 5008 net.exe net1.exe PID 5008 wrote to memory of 4588 5008 net.exe net1.exe PID 224 wrote to memory of 4932 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe net.exe PID 224 wrote to memory of 4932 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe net.exe PID 224 wrote to memory of 4932 224 f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe net.exe PID 4932 wrote to memory of 4636 4932 net.exe net1.exe PID 4932 wrote to memory of 4636 4932 net.exe net1.exe PID 4932 wrote to memory of 4636 4932 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe"C:\Users\Admin\AppData\Local\Temp\f0cbbdac43a26e19590a3873856a222e24c8fb7d3f635a7e74a21a19a8255ab5.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:5080
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1828
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3372 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1092 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:3748 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:4588
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:4636
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:4688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5cd72912af0a2867929721102d5137cbe
SHA15ab3378bf53409c7f1c43c26b4f77b5df4d0ca63
SHA256104a7f332afc11f236137403e39d42b6f2d3336f17c488c7938036a3933ed9c9
SHA5122577de1b6063db6dbb70f9334c89a7f0505f1f29c81af84ffc931ca35e757a4112c79d76c202be76c4c8b82be2c7308a2869b111186a78f14310c8bad6f3b709
-
Filesize
106KB
MD5cd72912af0a2867929721102d5137cbe
SHA15ab3378bf53409c7f1c43c26b4f77b5df4d0ca63
SHA256104a7f332afc11f236137403e39d42b6f2d3336f17c488c7938036a3933ed9c9
SHA5122577de1b6063db6dbb70f9334c89a7f0505f1f29c81af84ffc931ca35e757a4112c79d76c202be76c4c8b82be2c7308a2869b111186a78f14310c8bad6f3b709
-
Filesize
106KB
MD5cd72912af0a2867929721102d5137cbe
SHA15ab3378bf53409c7f1c43c26b4f77b5df4d0ca63
SHA256104a7f332afc11f236137403e39d42b6f2d3336f17c488c7938036a3933ed9c9
SHA5122577de1b6063db6dbb70f9334c89a7f0505f1f29c81af84ffc931ca35e757a4112c79d76c202be76c4c8b82be2c7308a2869b111186a78f14310c8bad6f3b709
-
Filesize
106KB
MD5cd72912af0a2867929721102d5137cbe
SHA15ab3378bf53409c7f1c43c26b4f77b5df4d0ca63
SHA256104a7f332afc11f236137403e39d42b6f2d3336f17c488c7938036a3933ed9c9
SHA5122577de1b6063db6dbb70f9334c89a7f0505f1f29c81af84ffc931ca35e757a4112c79d76c202be76c4c8b82be2c7308a2869b111186a78f14310c8bad6f3b709
-
Filesize
241KB
MD5f041bd09d2ba3509aef0fe50db28f493
SHA130921480465a1c323322779fe767fd2ec51db1e6
SHA256518c35ff2d49a312bfb52746e3f95ca1a1c65d72d1c300403095cdf5911a0520
SHA512c6cc231fed33c460c05dd5e9380e7290d07858317572028573fefb2e9add0a7248a2c65ea0dc6c79df470635fe8f6cd22a44e614badf6c93456579a990bdf293
-
Filesize
241KB
MD5f041bd09d2ba3509aef0fe50db28f493
SHA130921480465a1c323322779fe767fd2ec51db1e6
SHA256518c35ff2d49a312bfb52746e3f95ca1a1c65d72d1c300403095cdf5911a0520
SHA512c6cc231fed33c460c05dd5e9380e7290d07858317572028573fefb2e9add0a7248a2c65ea0dc6c79df470635fe8f6cd22a44e614badf6c93456579a990bdf293
-
Filesize
241KB
MD5f041bd09d2ba3509aef0fe50db28f493
SHA130921480465a1c323322779fe767fd2ec51db1e6
SHA256518c35ff2d49a312bfb52746e3f95ca1a1c65d72d1c300403095cdf5911a0520
SHA512c6cc231fed33c460c05dd5e9380e7290d07858317572028573fefb2e9add0a7248a2c65ea0dc6c79df470635fe8f6cd22a44e614badf6c93456579a990bdf293
-
Filesize
108KB
MD5f4c8d1af9ec5fddfea3a07fe130da934
SHA1ce7c622f731119c587eb0af44111016d10ea9c6d
SHA25652808123465019fc1fa637439d7c1ab70e1115514b095c417656eb42554907b9
SHA5123180fdfa1ba7152d75bc8838751f51645737580697f826200f0972413dd6181e3810f59427617597839daea727e9be1ddc9adc3a37445888049773fef4af03e8
-
Filesize
108KB
MD5f4c8d1af9ec5fddfea3a07fe130da934
SHA1ce7c622f731119c587eb0af44111016d10ea9c6d
SHA25652808123465019fc1fa637439d7c1ab70e1115514b095c417656eb42554907b9
SHA5123180fdfa1ba7152d75bc8838751f51645737580697f826200f0972413dd6181e3810f59427617597839daea727e9be1ddc9adc3a37445888049773fef4af03e8
-
Filesize
176KB
MD5abfd06896e92e3e35a3a47037c25ef2d
SHA1e34a7c14439f9998a5bf252b05c5f77738dc0b7e
SHA25684de66dacb2f1f2bb6d1edb6477f079ed8a730526fe85ecd0d66a1adc769b7d5
SHA51296ce6e9703e398f3ab3daa5d90fc982c436512cc0439f86361627db2488c069c229f0985449da48c09381e05afca954baabcdb430f9e4e9401fd37a6bce4e21e
-
Filesize
176KB
MD5abfd06896e92e3e35a3a47037c25ef2d
SHA1e34a7c14439f9998a5bf252b05c5f77738dc0b7e
SHA25684de66dacb2f1f2bb6d1edb6477f079ed8a730526fe85ecd0d66a1adc769b7d5
SHA51296ce6e9703e398f3ab3daa5d90fc982c436512cc0439f86361627db2488c069c229f0985449da48c09381e05afca954baabcdb430f9e4e9401fd37a6bce4e21e
-
Filesize
176KB
MD5abfd06896e92e3e35a3a47037c25ef2d
SHA1e34a7c14439f9998a5bf252b05c5f77738dc0b7e
SHA25684de66dacb2f1f2bb6d1edb6477f079ed8a730526fe85ecd0d66a1adc769b7d5
SHA51296ce6e9703e398f3ab3daa5d90fc982c436512cc0439f86361627db2488c069c229f0985449da48c09381e05afca954baabcdb430f9e4e9401fd37a6bce4e21e
-
Filesize
158KB
MD5ff228e4650fb7c208b8dc195114a11ff
SHA19deb7c7f1a843f783c5ca768f3dc86ec5eb1aa49
SHA256858dbf5360cfe1ab78ca1a39e95a3c0d03e86fa13514729b4b0e2ce5bedfc617
SHA512bcd399f655ab484941e49b15da840b4a2e9c224249935e3c810a04d1582ed9913cfa687deb17cf9cd9e3aea1736c0de7a12aa04dd895d432e518ae09300bc34e
-
Filesize
158KB
MD5ff228e4650fb7c208b8dc195114a11ff
SHA19deb7c7f1a843f783c5ca768f3dc86ec5eb1aa49
SHA256858dbf5360cfe1ab78ca1a39e95a3c0d03e86fa13514729b4b0e2ce5bedfc617
SHA512bcd399f655ab484941e49b15da840b4a2e9c224249935e3c810a04d1582ed9913cfa687deb17cf9cd9e3aea1736c0de7a12aa04dd895d432e518ae09300bc34e
-
Filesize
158KB
MD5ff228e4650fb7c208b8dc195114a11ff
SHA19deb7c7f1a843f783c5ca768f3dc86ec5eb1aa49
SHA256858dbf5360cfe1ab78ca1a39e95a3c0d03e86fa13514729b4b0e2ce5bedfc617
SHA512bcd399f655ab484941e49b15da840b4a2e9c224249935e3c810a04d1582ed9913cfa687deb17cf9cd9e3aea1736c0de7a12aa04dd895d432e518ae09300bc34e