Analysis
-
max time kernel
98s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:59
Static task
static1
Behavioral task
behavioral1
Sample
1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe
Resource
win10v2004-20221111-en
General
-
Target
1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe
-
Size
446KB
-
MD5
3130b132232ae3458473df27a02d99df
-
SHA1
16d94af790960c2bdfd22b74d8bc3f6314855399
-
SHA256
1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b
-
SHA512
72e05841604a29b18a1d35cf160da86b55f67850cf9c7127331445d47c059955b5024e13181461ed3450fb1ebf0e1a9aa46316aef59f355e6599616f018e8d11
-
SSDEEP
12288:RPXfRr19UY4vXVPN7D168uyGwz1GyNoJnUf7wBZjmLlpKh:RPJr19/0XDDhuyGdqAUfEBZjm5pKh
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 824 installd.exe 1676 nethtsrv.exe 360 netupdsrv.exe 1688 nethtsrv.exe 1992 netupdsrv.exe -
Loads dropped DLL 13 IoCs
Processes:
1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exeinstalld.exenethtsrv.exenethtsrv.exepid process 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe 824 installd.exe 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe 1676 nethtsrv.exe 1676 nethtsrv.exe 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe 1688 nethtsrv.exe 1688 nethtsrv.exe 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exedescription ioc process File created C:\Windows\SysWOW64\hfnapi.dll 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe File created C:\Windows\SysWOW64\hfpapi.dll 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe File created C:\Windows\SysWOW64\installd.exe 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe File created C:\Windows\SysWOW64\nethtsrv.exe 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe File created C:\Windows\SysWOW64\netupdsrv.exe 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe -
Drops file in Program Files directory 3 IoCs
Processes:
1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\data.xml 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 460 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 1688 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1060 wrote to memory of 772 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe net.exe PID 1060 wrote to memory of 772 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe net.exe PID 1060 wrote to memory of 772 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe net.exe PID 1060 wrote to memory of 772 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe net.exe PID 772 wrote to memory of 1164 772 net.exe net1.exe PID 772 wrote to memory of 1164 772 net.exe net1.exe PID 772 wrote to memory of 1164 772 net.exe net1.exe PID 772 wrote to memory of 1164 772 net.exe net1.exe PID 1060 wrote to memory of 2024 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe net.exe PID 1060 wrote to memory of 2024 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe net.exe PID 1060 wrote to memory of 2024 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe net.exe PID 1060 wrote to memory of 2024 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe net.exe PID 2024 wrote to memory of 692 2024 net.exe net1.exe PID 2024 wrote to memory of 692 2024 net.exe net1.exe PID 2024 wrote to memory of 692 2024 net.exe net1.exe PID 2024 wrote to memory of 692 2024 net.exe net1.exe PID 1060 wrote to memory of 824 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe installd.exe PID 1060 wrote to memory of 824 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe installd.exe PID 1060 wrote to memory of 824 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe installd.exe PID 1060 wrote to memory of 824 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe installd.exe PID 1060 wrote to memory of 824 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe installd.exe PID 1060 wrote to memory of 824 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe installd.exe PID 1060 wrote to memory of 824 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe installd.exe PID 1060 wrote to memory of 1676 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe nethtsrv.exe PID 1060 wrote to memory of 1676 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe nethtsrv.exe PID 1060 wrote to memory of 1676 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe nethtsrv.exe PID 1060 wrote to memory of 1676 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe nethtsrv.exe PID 1060 wrote to memory of 360 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe netupdsrv.exe PID 1060 wrote to memory of 360 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe netupdsrv.exe PID 1060 wrote to memory of 360 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe netupdsrv.exe PID 1060 wrote to memory of 360 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe netupdsrv.exe PID 1060 wrote to memory of 360 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe netupdsrv.exe PID 1060 wrote to memory of 360 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe netupdsrv.exe PID 1060 wrote to memory of 360 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe netupdsrv.exe PID 1060 wrote to memory of 1472 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe net.exe PID 1060 wrote to memory of 1472 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe net.exe PID 1060 wrote to memory of 1472 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe net.exe PID 1060 wrote to memory of 1472 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe net.exe PID 1472 wrote to memory of 280 1472 net.exe net1.exe PID 1472 wrote to memory of 280 1472 net.exe net1.exe PID 1472 wrote to memory of 280 1472 net.exe net1.exe PID 1472 wrote to memory of 280 1472 net.exe net1.exe PID 1060 wrote to memory of 1728 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe net.exe PID 1060 wrote to memory of 1728 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe net.exe PID 1060 wrote to memory of 1728 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe net.exe PID 1060 wrote to memory of 1728 1060 1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe net.exe PID 1728 wrote to memory of 1556 1728 net.exe net1.exe PID 1728 wrote to memory of 1556 1728 net.exe net1.exe PID 1728 wrote to memory of 1556 1728 net.exe net1.exe PID 1728 wrote to memory of 1556 1728 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe"C:\Users\Admin\AppData\Local\Temp\1a3b0f9f772238f49c506b6339bd3db86aca1a239c957d3d1e9a70c54905050b.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1164
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:692
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:824 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1676 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:360 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:280
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1556
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:1992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5c1a9a5db009eeeabbe25d4791981aab6
SHA1a621d963675750540d77adbea8ec2fe021e905a2
SHA25641b0b0f0780495c519be61a2631fbdfc203a3786c3dde675b7896778715a4daa
SHA5126a7eeecc86771a79cd79b0c102b10d4f295c59bb3a8b550bc22734cd8ee54094170e845814fb9f1e704056fbf9f6b582b936a332c10bd9e593bb41ebf77fd98e
-
Filesize
241KB
MD5e6c8bf81997a8f09353395d9c0bb7c6b
SHA13353c1ac2b7901167db68541f2695c06788a55cd
SHA256c44ad23e76135b7d92b2fe66f47fd0eef6582021ab2174ba9ffd01e80051325d
SHA512604d91851b61bb888319e36006e0eb645656b65475767c82a32b15f525dc52e89e15b79a5a60353bd18d60200f0d04eba999110a7d8d8d9599584fb1a3583884
-
Filesize
108KB
MD533de6c48635e8cc80e344a1e630b92cb
SHA1e7bfa1085dc57feac3d294ebff9f026e70454658
SHA256312f574ef09d78834b3b4422cf7be1d07ec0f98bde86eb609f69ff89b333f94f
SHA512522afd8a85eeeeaf71c1fb855e74bd85a8326a7d3bc9110bbee90fa0664aa0ba1afd82bad654af90e572e879435e487a99055317a36a2e3e2b57c33c45854b0e
-
Filesize
176KB
MD577332eb3ad3021a25378d8752e570c7b
SHA16367739dce6cf6a7cc8c7ed29faf3f85e77b3072
SHA2562bbc258f15584418b4cfbe8fe2535676fc663fa79a10567dfa46efa4b9df064e
SHA51268eeae58dd4ffe48c89ee990291c1a9697d72534400855ee4d673d46f44a1b8476b816b5debd108484180f77da818b31e2174bfd198d1b0fe2da9fc437231329
-
Filesize
176KB
MD577332eb3ad3021a25378d8752e570c7b
SHA16367739dce6cf6a7cc8c7ed29faf3f85e77b3072
SHA2562bbc258f15584418b4cfbe8fe2535676fc663fa79a10567dfa46efa4b9df064e
SHA51268eeae58dd4ffe48c89ee990291c1a9697d72534400855ee4d673d46f44a1b8476b816b5debd108484180f77da818b31e2174bfd198d1b0fe2da9fc437231329
-
Filesize
159KB
MD5c75edcd6220ff9dbf1a9c00068c376e6
SHA163ae0cd635562e2f2a4bd96d4bbf0af59f538a3d
SHA256c43cbd98f3cdb6c85ca2cde5a2cb32bc160ae99b55f3f762b976f9be95b4e9f6
SHA512fc68c0a03ae138120f8436eb9a696ab101818f59c79830c429b450418c8b6b2d0ebcf13e66c537a977c378bd9d31397c8ea32ba3faa0cdecb51424fd41c5e219
-
Filesize
159KB
MD5c75edcd6220ff9dbf1a9c00068c376e6
SHA163ae0cd635562e2f2a4bd96d4bbf0af59f538a3d
SHA256c43cbd98f3cdb6c85ca2cde5a2cb32bc160ae99b55f3f762b976f9be95b4e9f6
SHA512fc68c0a03ae138120f8436eb9a696ab101818f59c79830c429b450418c8b6b2d0ebcf13e66c537a977c378bd9d31397c8ea32ba3faa0cdecb51424fd41c5e219
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5c1a9a5db009eeeabbe25d4791981aab6
SHA1a621d963675750540d77adbea8ec2fe021e905a2
SHA25641b0b0f0780495c519be61a2631fbdfc203a3786c3dde675b7896778715a4daa
SHA5126a7eeecc86771a79cd79b0c102b10d4f295c59bb3a8b550bc22734cd8ee54094170e845814fb9f1e704056fbf9f6b582b936a332c10bd9e593bb41ebf77fd98e
-
Filesize
106KB
MD5c1a9a5db009eeeabbe25d4791981aab6
SHA1a621d963675750540d77adbea8ec2fe021e905a2
SHA25641b0b0f0780495c519be61a2631fbdfc203a3786c3dde675b7896778715a4daa
SHA5126a7eeecc86771a79cd79b0c102b10d4f295c59bb3a8b550bc22734cd8ee54094170e845814fb9f1e704056fbf9f6b582b936a332c10bd9e593bb41ebf77fd98e
-
Filesize
106KB
MD5c1a9a5db009eeeabbe25d4791981aab6
SHA1a621d963675750540d77adbea8ec2fe021e905a2
SHA25641b0b0f0780495c519be61a2631fbdfc203a3786c3dde675b7896778715a4daa
SHA5126a7eeecc86771a79cd79b0c102b10d4f295c59bb3a8b550bc22734cd8ee54094170e845814fb9f1e704056fbf9f6b582b936a332c10bd9e593bb41ebf77fd98e
-
Filesize
241KB
MD5e6c8bf81997a8f09353395d9c0bb7c6b
SHA13353c1ac2b7901167db68541f2695c06788a55cd
SHA256c44ad23e76135b7d92b2fe66f47fd0eef6582021ab2174ba9ffd01e80051325d
SHA512604d91851b61bb888319e36006e0eb645656b65475767c82a32b15f525dc52e89e15b79a5a60353bd18d60200f0d04eba999110a7d8d8d9599584fb1a3583884
-
Filesize
241KB
MD5e6c8bf81997a8f09353395d9c0bb7c6b
SHA13353c1ac2b7901167db68541f2695c06788a55cd
SHA256c44ad23e76135b7d92b2fe66f47fd0eef6582021ab2174ba9ffd01e80051325d
SHA512604d91851b61bb888319e36006e0eb645656b65475767c82a32b15f525dc52e89e15b79a5a60353bd18d60200f0d04eba999110a7d8d8d9599584fb1a3583884
-
Filesize
108KB
MD533de6c48635e8cc80e344a1e630b92cb
SHA1e7bfa1085dc57feac3d294ebff9f026e70454658
SHA256312f574ef09d78834b3b4422cf7be1d07ec0f98bde86eb609f69ff89b333f94f
SHA512522afd8a85eeeeaf71c1fb855e74bd85a8326a7d3bc9110bbee90fa0664aa0ba1afd82bad654af90e572e879435e487a99055317a36a2e3e2b57c33c45854b0e
-
Filesize
176KB
MD577332eb3ad3021a25378d8752e570c7b
SHA16367739dce6cf6a7cc8c7ed29faf3f85e77b3072
SHA2562bbc258f15584418b4cfbe8fe2535676fc663fa79a10567dfa46efa4b9df064e
SHA51268eeae58dd4ffe48c89ee990291c1a9697d72534400855ee4d673d46f44a1b8476b816b5debd108484180f77da818b31e2174bfd198d1b0fe2da9fc437231329
-
Filesize
159KB
MD5c75edcd6220ff9dbf1a9c00068c376e6
SHA163ae0cd635562e2f2a4bd96d4bbf0af59f538a3d
SHA256c43cbd98f3cdb6c85ca2cde5a2cb32bc160ae99b55f3f762b976f9be95b4e9f6
SHA512fc68c0a03ae138120f8436eb9a696ab101818f59c79830c429b450418c8b6b2d0ebcf13e66c537a977c378bd9d31397c8ea32ba3faa0cdecb51424fd41c5e219