Analysis
-
max time kernel
43s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:57
Static task
static1
Behavioral task
behavioral1
Sample
42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe
Resource
win10v2004-20221111-en
General
-
Target
42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe
-
Size
447KB
-
MD5
f50553427b38ca0a9961a9356125842b
-
SHA1
e748e46d3e3aa2fa336790a4a759d1eea61e8ff6
-
SHA256
42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5
-
SHA512
eeed9db6f19c0365e40f1e8d16034e514f584c471616c83a66ce61909bd6f49f0f166d981cf0182bb6ce82ffb916b3acee400e455dd5aa742dff53a6d2843b43
-
SSDEEP
12288:sV6tpTHEOZoCOQ+q5ILOrxGy4Gbvsn5NoqSw:sV6rTkObl5kO1XuNo3w
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 1288 installd.exe 740 nethtsrv.exe 1200 netupdsrv.exe 1752 nethtsrv.exe 996 netupdsrv.exe -
Loads dropped DLL 13 IoCs
Processes:
42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exeinstalld.exenethtsrv.exenethtsrv.exepid process 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe 1288 installd.exe 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe 740 nethtsrv.exe 740 nethtsrv.exe 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe 1752 nethtsrv.exe 1752 nethtsrv.exe 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exedescription ioc process File created C:\Windows\SysWOW64\hfnapi.dll 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe File created C:\Windows\SysWOW64\hfpapi.dll 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe File created C:\Windows\SysWOW64\installd.exe 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe File created C:\Windows\SysWOW64\nethtsrv.exe 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe File created C:\Windows\SysWOW64\netupdsrv.exe 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe -
Drops file in Program Files directory 3 IoCs
Processes:
42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\data.xml 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 464 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 1752 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exenet.exenet.exenet.exenet.exedescription pid process target process PID 616 wrote to memory of 1284 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe net.exe PID 616 wrote to memory of 1284 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe net.exe PID 616 wrote to memory of 1284 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe net.exe PID 616 wrote to memory of 1284 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe net.exe PID 1284 wrote to memory of 1212 1284 net.exe net1.exe PID 1284 wrote to memory of 1212 1284 net.exe net1.exe PID 1284 wrote to memory of 1212 1284 net.exe net1.exe PID 1284 wrote to memory of 1212 1284 net.exe net1.exe PID 616 wrote to memory of 624 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe net.exe PID 616 wrote to memory of 624 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe net.exe PID 616 wrote to memory of 624 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe net.exe PID 616 wrote to memory of 624 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe net.exe PID 624 wrote to memory of 860 624 net.exe net1.exe PID 624 wrote to memory of 860 624 net.exe net1.exe PID 624 wrote to memory of 860 624 net.exe net1.exe PID 624 wrote to memory of 860 624 net.exe net1.exe PID 616 wrote to memory of 1288 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe installd.exe PID 616 wrote to memory of 1288 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe installd.exe PID 616 wrote to memory of 1288 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe installd.exe PID 616 wrote to memory of 1288 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe installd.exe PID 616 wrote to memory of 1288 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe installd.exe PID 616 wrote to memory of 1288 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe installd.exe PID 616 wrote to memory of 1288 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe installd.exe PID 616 wrote to memory of 740 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe nethtsrv.exe PID 616 wrote to memory of 740 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe nethtsrv.exe PID 616 wrote to memory of 740 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe nethtsrv.exe PID 616 wrote to memory of 740 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe nethtsrv.exe PID 616 wrote to memory of 1200 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe netupdsrv.exe PID 616 wrote to memory of 1200 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe netupdsrv.exe PID 616 wrote to memory of 1200 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe netupdsrv.exe PID 616 wrote to memory of 1200 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe netupdsrv.exe PID 616 wrote to memory of 1200 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe netupdsrv.exe PID 616 wrote to memory of 1200 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe netupdsrv.exe PID 616 wrote to memory of 1200 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe netupdsrv.exe PID 616 wrote to memory of 1992 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe net.exe PID 616 wrote to memory of 1992 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe net.exe PID 616 wrote to memory of 1992 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe net.exe PID 616 wrote to memory of 1992 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe net.exe PID 1992 wrote to memory of 1740 1992 net.exe net1.exe PID 1992 wrote to memory of 1740 1992 net.exe net1.exe PID 1992 wrote to memory of 1740 1992 net.exe net1.exe PID 1992 wrote to memory of 1740 1992 net.exe net1.exe PID 616 wrote to memory of 1152 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe net.exe PID 616 wrote to memory of 1152 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe net.exe PID 616 wrote to memory of 1152 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe net.exe PID 616 wrote to memory of 1152 616 42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe net.exe PID 1152 wrote to memory of 1292 1152 net.exe net1.exe PID 1152 wrote to memory of 1292 1152 net.exe net1.exe PID 1152 wrote to memory of 1292 1152 net.exe net1.exe PID 1152 wrote to memory of 1292 1152 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe"C:\Users\Admin\AppData\Local\Temp\42db0811ab0c36734f23e0e87685a6e99f04ac109a6fe80c49908d0c75d0bca5.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1212
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:860
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1288 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:740 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1200 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1740
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1292
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD561cdf097f22241ba34f1d9dc5d61b84b
SHA1daf236e739970b40eeedd67f1a1f1a47660d9898
SHA256a1ce5df0483ffd20ad6eaf58cc757f95b4d866f1a5168c93bf956f7b1d0df454
SHA512fec9a762b0f96a310cb0683c52fb1a049bccdb7b48ea01bc68f08a17d28d6810cf040795000e3e53ef8dc0a190d53943fa585ca4db9fb3012bb889e91bfd927f
-
Filesize
244KB
MD55f10764cd7446c9c9e575c2b0c612a5f
SHA1cb94a9a51251039728f861b2329948c4dab94d8e
SHA256eaa330ccf6d92b21fc1c2daf3ea51e6596c14cd98381960777cfb3ecd0f5128a
SHA51250512e05a0018bc96c6d1485ae19771cc33c9c021d62ac36beb67e8ac38d6668daae2a856ed8088bdacaf20ec9f57427bbec2a99b4a34d62d19db906ec7630f4
-
Filesize
108KB
MD50f632a6e7fe01df2a51dedf6fe2a92a0
SHA11dc59f49aa549eed7ae147dd52806d139764bc88
SHA256dd19ca649e916982099ef250d8bb85c9480f0c570f166bf589b62d5a7888842c
SHA512e7d9bd95d0ef1385395951197134712b6005a11ab5c997f1e8681883bd426302241b6345645283388b46619e9484211c03fe56fe7b6648eab0fd0aef9566029a
-
Filesize
176KB
MD5e4b1a2f3e1f390bbfeb64903eea390d1
SHA15b896eb1c88e108c3de9e1b6c2fc9907c7d336e3
SHA25643a754825cf8e4504184379d5e0bac75e989ffedf222a9114c3ff0385a9e848e
SHA5124b9de33d2742b7fbfa929108c59e22b06a53e61c930ecd7e3b04f4cca7e72434fbca0796e6b1de0c03ea44a4761730fe8818267b339d2e4e82f7c64343fa6430
-
Filesize
176KB
MD5e4b1a2f3e1f390bbfeb64903eea390d1
SHA15b896eb1c88e108c3de9e1b6c2fc9907c7d336e3
SHA25643a754825cf8e4504184379d5e0bac75e989ffedf222a9114c3ff0385a9e848e
SHA5124b9de33d2742b7fbfa929108c59e22b06a53e61c930ecd7e3b04f4cca7e72434fbca0796e6b1de0c03ea44a4761730fe8818267b339d2e4e82f7c64343fa6430
-
Filesize
158KB
MD55a2e272fda0274762309d3842a742b4a
SHA1490d8e3f626a08ddf5d023765f88a0509be9114a
SHA25615750f6717578b34e8fab15b77ef7e4ca975d3dde24447022e917ad1615fdfb2
SHA5122503756b8a5697fccc2c825beebb0bea1b7642f8aafe03eaa53079b3169b3f052ede6dc4864040dc19a7e4ea0c3b25e2c59ce2338010b59b32db3fc784b8646c
-
Filesize
158KB
MD55a2e272fda0274762309d3842a742b4a
SHA1490d8e3f626a08ddf5d023765f88a0509be9114a
SHA25615750f6717578b34e8fab15b77ef7e4ca975d3dde24447022e917ad1615fdfb2
SHA5122503756b8a5697fccc2c825beebb0bea1b7642f8aafe03eaa53079b3169b3f052ede6dc4864040dc19a7e4ea0c3b25e2c59ce2338010b59b32db3fc784b8646c
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD561cdf097f22241ba34f1d9dc5d61b84b
SHA1daf236e739970b40eeedd67f1a1f1a47660d9898
SHA256a1ce5df0483ffd20ad6eaf58cc757f95b4d866f1a5168c93bf956f7b1d0df454
SHA512fec9a762b0f96a310cb0683c52fb1a049bccdb7b48ea01bc68f08a17d28d6810cf040795000e3e53ef8dc0a190d53943fa585ca4db9fb3012bb889e91bfd927f
-
Filesize
106KB
MD561cdf097f22241ba34f1d9dc5d61b84b
SHA1daf236e739970b40eeedd67f1a1f1a47660d9898
SHA256a1ce5df0483ffd20ad6eaf58cc757f95b4d866f1a5168c93bf956f7b1d0df454
SHA512fec9a762b0f96a310cb0683c52fb1a049bccdb7b48ea01bc68f08a17d28d6810cf040795000e3e53ef8dc0a190d53943fa585ca4db9fb3012bb889e91bfd927f
-
Filesize
106KB
MD561cdf097f22241ba34f1d9dc5d61b84b
SHA1daf236e739970b40eeedd67f1a1f1a47660d9898
SHA256a1ce5df0483ffd20ad6eaf58cc757f95b4d866f1a5168c93bf956f7b1d0df454
SHA512fec9a762b0f96a310cb0683c52fb1a049bccdb7b48ea01bc68f08a17d28d6810cf040795000e3e53ef8dc0a190d53943fa585ca4db9fb3012bb889e91bfd927f
-
Filesize
244KB
MD55f10764cd7446c9c9e575c2b0c612a5f
SHA1cb94a9a51251039728f861b2329948c4dab94d8e
SHA256eaa330ccf6d92b21fc1c2daf3ea51e6596c14cd98381960777cfb3ecd0f5128a
SHA51250512e05a0018bc96c6d1485ae19771cc33c9c021d62ac36beb67e8ac38d6668daae2a856ed8088bdacaf20ec9f57427bbec2a99b4a34d62d19db906ec7630f4
-
Filesize
244KB
MD55f10764cd7446c9c9e575c2b0c612a5f
SHA1cb94a9a51251039728f861b2329948c4dab94d8e
SHA256eaa330ccf6d92b21fc1c2daf3ea51e6596c14cd98381960777cfb3ecd0f5128a
SHA51250512e05a0018bc96c6d1485ae19771cc33c9c021d62ac36beb67e8ac38d6668daae2a856ed8088bdacaf20ec9f57427bbec2a99b4a34d62d19db906ec7630f4
-
Filesize
108KB
MD50f632a6e7fe01df2a51dedf6fe2a92a0
SHA11dc59f49aa549eed7ae147dd52806d139764bc88
SHA256dd19ca649e916982099ef250d8bb85c9480f0c570f166bf589b62d5a7888842c
SHA512e7d9bd95d0ef1385395951197134712b6005a11ab5c997f1e8681883bd426302241b6345645283388b46619e9484211c03fe56fe7b6648eab0fd0aef9566029a
-
Filesize
176KB
MD5e4b1a2f3e1f390bbfeb64903eea390d1
SHA15b896eb1c88e108c3de9e1b6c2fc9907c7d336e3
SHA25643a754825cf8e4504184379d5e0bac75e989ffedf222a9114c3ff0385a9e848e
SHA5124b9de33d2742b7fbfa929108c59e22b06a53e61c930ecd7e3b04f4cca7e72434fbca0796e6b1de0c03ea44a4761730fe8818267b339d2e4e82f7c64343fa6430
-
Filesize
158KB
MD55a2e272fda0274762309d3842a742b4a
SHA1490d8e3f626a08ddf5d023765f88a0509be9114a
SHA25615750f6717578b34e8fab15b77ef7e4ca975d3dde24447022e917ad1615fdfb2
SHA5122503756b8a5697fccc2c825beebb0bea1b7642f8aafe03eaa53079b3169b3f052ede6dc4864040dc19a7e4ea0c3b25e2c59ce2338010b59b32db3fc784b8646c