Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:13
Static task
static1
Behavioral task
behavioral1
Sample
bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe
Resource
win10v2004-20221111-en
General
-
Target
bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe
-
Size
603KB
-
MD5
7df3ca314cb5038ad885ea09004ae3d0
-
SHA1
f5dc7f80bc9660c8b3cbdde7c5ce84ec1d0067bf
-
SHA256
bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833
-
SHA512
238710a440fda8218504c83fc5a92523f1a2159b04bafb975ccad19ad8be46ae696f0e573b7f216db04534e767776e013b389f4214459c1b007404c728bb3916
-
SSDEEP
12288:+Iny5DYTVzOMxq0X3IwuJAULNL1EZyK/WGB0GSZ0:gUTV9q0X3IlHLHPK/WGB0G
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 1240 installd.exe 616 nethtsrv.exe 1260 netupdsrv.exe 1852 nethtsrv.exe 1752 netupdsrv.exe -
Loads dropped DLL 13 IoCs
Processes:
bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exeinstalld.exenethtsrv.exenethtsrv.exepid process 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe 1240 installd.exe 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe 616 nethtsrv.exe 616 nethtsrv.exe 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe 1852 nethtsrv.exe 1852 nethtsrv.exe 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exedescription ioc process File created C:\Windows\SysWOW64\hfnapi.dll bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe File created C:\Windows\SysWOW64\hfpapi.dll bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe File created C:\Windows\SysWOW64\installd.exe bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe File created C:\Windows\SysWOW64\nethtsrv.exe bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe File created C:\Windows\SysWOW64\netupdsrv.exe bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe -
Drops file in Program Files directory 3 IoCs
Processes:
bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\data.xml bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 460 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 1852 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1044 wrote to memory of 860 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe net.exe PID 1044 wrote to memory of 860 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe net.exe PID 1044 wrote to memory of 860 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe net.exe PID 1044 wrote to memory of 860 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe net.exe PID 860 wrote to memory of 2024 860 net.exe net1.exe PID 860 wrote to memory of 2024 860 net.exe net1.exe PID 860 wrote to memory of 2024 860 net.exe net1.exe PID 860 wrote to memory of 2024 860 net.exe net1.exe PID 1044 wrote to memory of 1840 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe net.exe PID 1044 wrote to memory of 1840 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe net.exe PID 1044 wrote to memory of 1840 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe net.exe PID 1044 wrote to memory of 1840 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe net.exe PID 1840 wrote to memory of 1324 1840 net.exe net1.exe PID 1840 wrote to memory of 1324 1840 net.exe net1.exe PID 1840 wrote to memory of 1324 1840 net.exe net1.exe PID 1840 wrote to memory of 1324 1840 net.exe net1.exe PID 1044 wrote to memory of 1240 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe installd.exe PID 1044 wrote to memory of 1240 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe installd.exe PID 1044 wrote to memory of 1240 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe installd.exe PID 1044 wrote to memory of 1240 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe installd.exe PID 1044 wrote to memory of 1240 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe installd.exe PID 1044 wrote to memory of 1240 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe installd.exe PID 1044 wrote to memory of 1240 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe installd.exe PID 1044 wrote to memory of 616 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe nethtsrv.exe PID 1044 wrote to memory of 616 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe nethtsrv.exe PID 1044 wrote to memory of 616 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe nethtsrv.exe PID 1044 wrote to memory of 616 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe nethtsrv.exe PID 1044 wrote to memory of 1260 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe netupdsrv.exe PID 1044 wrote to memory of 1260 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe netupdsrv.exe PID 1044 wrote to memory of 1260 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe netupdsrv.exe PID 1044 wrote to memory of 1260 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe netupdsrv.exe PID 1044 wrote to memory of 1260 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe netupdsrv.exe PID 1044 wrote to memory of 1260 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe netupdsrv.exe PID 1044 wrote to memory of 1260 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe netupdsrv.exe PID 1044 wrote to memory of 1972 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe net.exe PID 1044 wrote to memory of 1972 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe net.exe PID 1044 wrote to memory of 1972 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe net.exe PID 1044 wrote to memory of 1972 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe net.exe PID 1972 wrote to memory of 1156 1972 net.exe net1.exe PID 1972 wrote to memory of 1156 1972 net.exe net1.exe PID 1972 wrote to memory of 1156 1972 net.exe net1.exe PID 1972 wrote to memory of 1156 1972 net.exe net1.exe PID 1044 wrote to memory of 1140 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe net.exe PID 1044 wrote to memory of 1140 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe net.exe PID 1044 wrote to memory of 1140 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe net.exe PID 1044 wrote to memory of 1140 1044 bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe net.exe PID 1140 wrote to memory of 1732 1140 net.exe net1.exe PID 1140 wrote to memory of 1732 1140 net.exe net1.exe PID 1140 wrote to memory of 1732 1140 net.exe net1.exe PID 1140 wrote to memory of 1732 1140 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe"C:\Users\Admin\AppData\Local\Temp\bf5822e15ccf6a0e12f58cf020196c4d92aaf5b5e3b9f830a0bb958826d82833.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:2024
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1324
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1240 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:616 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1260 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1156
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1732
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:1752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD52e8c6bca8a217b376b1664bf3186bde6
SHA1d4d69b1fa8c2229bfb1b9b6c371b74ecd496fc1a
SHA256060b376c5e392a1ee7f6611ce71f1b0c5f37fdafcebbe9708cc05471c889ebf8
SHA5127ee5c6a0c4196f298eea6e70a0472bcb722a90c120b5368f383b0788a584526d40e3470ef21ee5cfa8b77c379b00d3e86d6054b09201969abfa916b4d4d3a11a
-
Filesize
244KB
MD525591c8d98e9a2161ecfa93e5f22f7f5
SHA1b766d7c400ca12f8796926e6959d9ce181b2f353
SHA2564f6309b46bbc4b98b93519bb81d93c2b0a3fd430098ff4c7fa3713d9e9f54081
SHA5125c832c55db06da23331a21894d83bca2661c020ad4aae172d088dbe606509db5c73b52752b97a7f06622c7494f781f6cd4f26c7680119f4d6924cf0fe4ce8d56
-
Filesize
108KB
MD5fd8f56493821ccd34fa015f7c551b562
SHA12ec69e401a9231b4b6e805eeeed1f90fd5044805
SHA256963671b88c5447030fa9cd9ef9dc4812c7d4e5e51551cbadae80832c5c6310eb
SHA51267c78448c574fdd76e5e3029d0ddcb98ad46edbd2ac0bc8b66db2196e743f0f3cdf07a4bdd98a76fc803601c3ba1a1359d24f67ed2786514908a23fde849c9dd
-
Filesize
176KB
MD57f00b897cddd0ba70b0a2062b24d3946
SHA192e5121e09af0c77ccefa49d1fdb65e3b41696c4
SHA256717158b9848f3b2f7bd9dd207d90aacb2a47f50f22c96f58e2ef62d6962bae52
SHA512d506532865c003232782c85cb67fe5069b6b817ba1d700657ee9ed606761bc5b1a31f06f9c48cfd4227bd37f24e2c483789d9997337be79f2f6ab9f9231621e7
-
Filesize
176KB
MD57f00b897cddd0ba70b0a2062b24d3946
SHA192e5121e09af0c77ccefa49d1fdb65e3b41696c4
SHA256717158b9848f3b2f7bd9dd207d90aacb2a47f50f22c96f58e2ef62d6962bae52
SHA512d506532865c003232782c85cb67fe5069b6b817ba1d700657ee9ed606761bc5b1a31f06f9c48cfd4227bd37f24e2c483789d9997337be79f2f6ab9f9231621e7
-
Filesize
158KB
MD50cc8e2d476c4ed701a76863168ca28ed
SHA1a12491ef5606d839942d02aea79fe6a92b9c0dac
SHA25661901279c01cdbc0f585da62c1bdc70d8ee6e20e84d4b56fac44251e772f373b
SHA5129bf1004fd7b1614bc1c3ee3d7077adffa9713b008bc8c76893522db60846e6012b80230440c80899f364c069d3c871428c0e87585eb35cead37900caaf983fca
-
Filesize
158KB
MD50cc8e2d476c4ed701a76863168ca28ed
SHA1a12491ef5606d839942d02aea79fe6a92b9c0dac
SHA25661901279c01cdbc0f585da62c1bdc70d8ee6e20e84d4b56fac44251e772f373b
SHA5129bf1004fd7b1614bc1c3ee3d7077adffa9713b008bc8c76893522db60846e6012b80230440c80899f364c069d3c871428c0e87585eb35cead37900caaf983fca
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD52e8c6bca8a217b376b1664bf3186bde6
SHA1d4d69b1fa8c2229bfb1b9b6c371b74ecd496fc1a
SHA256060b376c5e392a1ee7f6611ce71f1b0c5f37fdafcebbe9708cc05471c889ebf8
SHA5127ee5c6a0c4196f298eea6e70a0472bcb722a90c120b5368f383b0788a584526d40e3470ef21ee5cfa8b77c379b00d3e86d6054b09201969abfa916b4d4d3a11a
-
Filesize
106KB
MD52e8c6bca8a217b376b1664bf3186bde6
SHA1d4d69b1fa8c2229bfb1b9b6c371b74ecd496fc1a
SHA256060b376c5e392a1ee7f6611ce71f1b0c5f37fdafcebbe9708cc05471c889ebf8
SHA5127ee5c6a0c4196f298eea6e70a0472bcb722a90c120b5368f383b0788a584526d40e3470ef21ee5cfa8b77c379b00d3e86d6054b09201969abfa916b4d4d3a11a
-
Filesize
106KB
MD52e8c6bca8a217b376b1664bf3186bde6
SHA1d4d69b1fa8c2229bfb1b9b6c371b74ecd496fc1a
SHA256060b376c5e392a1ee7f6611ce71f1b0c5f37fdafcebbe9708cc05471c889ebf8
SHA5127ee5c6a0c4196f298eea6e70a0472bcb722a90c120b5368f383b0788a584526d40e3470ef21ee5cfa8b77c379b00d3e86d6054b09201969abfa916b4d4d3a11a
-
Filesize
244KB
MD525591c8d98e9a2161ecfa93e5f22f7f5
SHA1b766d7c400ca12f8796926e6959d9ce181b2f353
SHA2564f6309b46bbc4b98b93519bb81d93c2b0a3fd430098ff4c7fa3713d9e9f54081
SHA5125c832c55db06da23331a21894d83bca2661c020ad4aae172d088dbe606509db5c73b52752b97a7f06622c7494f781f6cd4f26c7680119f4d6924cf0fe4ce8d56
-
Filesize
244KB
MD525591c8d98e9a2161ecfa93e5f22f7f5
SHA1b766d7c400ca12f8796926e6959d9ce181b2f353
SHA2564f6309b46bbc4b98b93519bb81d93c2b0a3fd430098ff4c7fa3713d9e9f54081
SHA5125c832c55db06da23331a21894d83bca2661c020ad4aae172d088dbe606509db5c73b52752b97a7f06622c7494f781f6cd4f26c7680119f4d6924cf0fe4ce8d56
-
Filesize
108KB
MD5fd8f56493821ccd34fa015f7c551b562
SHA12ec69e401a9231b4b6e805eeeed1f90fd5044805
SHA256963671b88c5447030fa9cd9ef9dc4812c7d4e5e51551cbadae80832c5c6310eb
SHA51267c78448c574fdd76e5e3029d0ddcb98ad46edbd2ac0bc8b66db2196e743f0f3cdf07a4bdd98a76fc803601c3ba1a1359d24f67ed2786514908a23fde849c9dd
-
Filesize
176KB
MD57f00b897cddd0ba70b0a2062b24d3946
SHA192e5121e09af0c77ccefa49d1fdb65e3b41696c4
SHA256717158b9848f3b2f7bd9dd207d90aacb2a47f50f22c96f58e2ef62d6962bae52
SHA512d506532865c003232782c85cb67fe5069b6b817ba1d700657ee9ed606761bc5b1a31f06f9c48cfd4227bd37f24e2c483789d9997337be79f2f6ab9f9231621e7
-
Filesize
158KB
MD50cc8e2d476c4ed701a76863168ca28ed
SHA1a12491ef5606d839942d02aea79fe6a92b9c0dac
SHA25661901279c01cdbc0f585da62c1bdc70d8ee6e20e84d4b56fac44251e772f373b
SHA5129bf1004fd7b1614bc1c3ee3d7077adffa9713b008bc8c76893522db60846e6012b80230440c80899f364c069d3c871428c0e87585eb35cead37900caaf983fca