Analysis
-
max time kernel
42s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:16
Static task
static1
Behavioral task
behavioral1
Sample
a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe
Resource
win10v2004-20221111-en
General
-
Target
a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe
-
Size
602KB
-
MD5
7239f10b78b42697f4653624322100f8
-
SHA1
2e0eb0fac73ff4ba8373081c5ea74a15a3972fe4
-
SHA256
a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206
-
SHA512
bb2dcfd91c5c4906c5a3181b5ba3ffac5d729bf443c8d0ca21d68386dcf7fba19f235dc9213852af1e12de702ca3fc9bb1a4a6745cf49c1e69f9a5c0d139c42a
-
SSDEEP
12288:mIny5DYTkL6Fm8OdMapzH1Uzy6oGKBdT6DLIHSudoRjOt:IUTTgtdMa11SUGG6wHSHG
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 1228 installd.exe 576 nethtsrv.exe 1056 netupdsrv.exe 1156 nethtsrv.exe 948 netupdsrv.exe -
Loads dropped DLL 13 IoCs
Processes:
a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exeinstalld.exenethtsrv.exenethtsrv.exepid process 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe 1228 installd.exe 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe 576 nethtsrv.exe 576 nethtsrv.exe 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe 1156 nethtsrv.exe 1156 nethtsrv.exe 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exedescription ioc process File created C:\Windows\SysWOW64\hfnapi.dll a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe File created C:\Windows\SysWOW64\hfpapi.dll a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe File created C:\Windows\SysWOW64\installd.exe a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe File created C:\Windows\SysWOW64\nethtsrv.exe a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe File created C:\Windows\SysWOW64\netupdsrv.exe a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe -
Drops file in Program Files directory 3 IoCs
Processes:
a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exedescription ioc process File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe File created C:\Program Files (x86)\Common Files\Config\data.xml a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 460 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 1156 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exenet.exenet.exenet.exenet.exedescription pid process target process PID 2024 wrote to memory of 1992 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe net.exe PID 2024 wrote to memory of 1992 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe net.exe PID 2024 wrote to memory of 1992 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe net.exe PID 2024 wrote to memory of 1992 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe net.exe PID 1992 wrote to memory of 1112 1992 net.exe net1.exe PID 1992 wrote to memory of 1112 1992 net.exe net1.exe PID 1992 wrote to memory of 1112 1992 net.exe net1.exe PID 1992 wrote to memory of 1112 1992 net.exe net1.exe PID 2024 wrote to memory of 860 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe net.exe PID 2024 wrote to memory of 860 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe net.exe PID 2024 wrote to memory of 860 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe net.exe PID 2024 wrote to memory of 860 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe net.exe PID 860 wrote to memory of 776 860 net.exe net1.exe PID 860 wrote to memory of 776 860 net.exe net1.exe PID 860 wrote to memory of 776 860 net.exe net1.exe PID 860 wrote to memory of 776 860 net.exe net1.exe PID 2024 wrote to memory of 1228 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe installd.exe PID 2024 wrote to memory of 1228 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe installd.exe PID 2024 wrote to memory of 1228 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe installd.exe PID 2024 wrote to memory of 1228 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe installd.exe PID 2024 wrote to memory of 1228 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe installd.exe PID 2024 wrote to memory of 1228 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe installd.exe PID 2024 wrote to memory of 1228 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe installd.exe PID 2024 wrote to memory of 576 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe nethtsrv.exe PID 2024 wrote to memory of 576 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe nethtsrv.exe PID 2024 wrote to memory of 576 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe nethtsrv.exe PID 2024 wrote to memory of 576 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe nethtsrv.exe PID 2024 wrote to memory of 1056 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe netupdsrv.exe PID 2024 wrote to memory of 1056 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe netupdsrv.exe PID 2024 wrote to memory of 1056 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe netupdsrv.exe PID 2024 wrote to memory of 1056 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe netupdsrv.exe PID 2024 wrote to memory of 1056 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe netupdsrv.exe PID 2024 wrote to memory of 1056 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe netupdsrv.exe PID 2024 wrote to memory of 1056 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe netupdsrv.exe PID 2024 wrote to memory of 992 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe net.exe PID 2024 wrote to memory of 992 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe net.exe PID 2024 wrote to memory of 992 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe net.exe PID 2024 wrote to memory of 992 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe net.exe PID 992 wrote to memory of 1636 992 net.exe net1.exe PID 992 wrote to memory of 1636 992 net.exe net1.exe PID 992 wrote to memory of 1636 992 net.exe net1.exe PID 992 wrote to memory of 1636 992 net.exe net1.exe PID 2024 wrote to memory of 1812 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe net.exe PID 2024 wrote to memory of 1812 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe net.exe PID 2024 wrote to memory of 1812 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe net.exe PID 2024 wrote to memory of 1812 2024 a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe net.exe PID 1812 wrote to memory of 1908 1812 net.exe net1.exe PID 1812 wrote to memory of 1908 1812 net.exe net1.exe PID 1812 wrote to memory of 1908 1812 net.exe net1.exe PID 1812 wrote to memory of 1908 1812 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe"C:\Users\Admin\AppData\Local\Temp\a68852bd6f3eb0f486ec1930d7851d8f16bf343bd0a1601b993624bbaafcb206.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1112
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:776
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1228 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:576 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1056 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1636
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1908
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5363623d1a52f89430f97a57365781d39
SHA198600df89e7a4acc9ef1d7b49745024f202d5a62
SHA2562ff18b370776c32960bb1bdcec09429d9a0a581b29619a46aa2e60b42b3fe201
SHA512f2261e37a90db613ab59e80b30f224221999799b07d19ed816d28a90a781016685db69d89ffa965e33a1e7a4dc018b98376acbdb27b539e663b42d0e07875cb3
-
Filesize
241KB
MD5c077bda36ad7ad3d453ec62d6eca45e2
SHA1d02866501cc9cf41be09da8baff00e95c488d17a
SHA256024bd1d4b877cb1f749851a7f8b803d7e4ee181962cbec37b1416bf5cf680e9a
SHA512685982cd98fe8a36f092b0da50fc1046102104f37db965c4ba4115dcec9d4646711da0ffb1205e6aa6fd108c8c0986daff1d5ef3bf3b414da272325e7e6e68ef
-
Filesize
108KB
MD590836769fec87e147bab5ae42da6e68a
SHA139a3784a15a6f2311f23519075764cd7ecfbfe4c
SHA256dd1da53d3e9eb0b3bf85514be735146051bf299323aebf7b99f41b5f5bb2646a
SHA5121dfafc841956a75aeade805b9734f98d4244704e4d31539fbc021eec3041c4f7460d3b920954c56c18969b4207424fbd285b4706d550b2885ab77e5067e5c656
-
Filesize
176KB
MD5f9e14fff604f0d483c905366768077a6
SHA18a51ee1ffc83eb091898b8724e97ff09698656ae
SHA256175fb1a1481693e7e2ea665fcb29a58a9f365515c402ea5d1da8a90320c73276
SHA512a02d2c2eb1f2a1504e83368caf674b822dc9526ac69e263678ebcf11c43ac0a2a7d2bfb9a83d206ec2740d05ae3a2ba782da8f9bd4785e4afc9b22a70b7f3243
-
Filesize
176KB
MD5f9e14fff604f0d483c905366768077a6
SHA18a51ee1ffc83eb091898b8724e97ff09698656ae
SHA256175fb1a1481693e7e2ea665fcb29a58a9f365515c402ea5d1da8a90320c73276
SHA512a02d2c2eb1f2a1504e83368caf674b822dc9526ac69e263678ebcf11c43ac0a2a7d2bfb9a83d206ec2740d05ae3a2ba782da8f9bd4785e4afc9b22a70b7f3243
-
Filesize
158KB
MD594f744a2316a29c173b545e9e0ec3804
SHA1cc6c120055ec713ceadec403ab42cd97a86e4439
SHA256adca5050acb1d304726030e3ed6824061fab36e35439a9027d47eb3c04d7e7dc
SHA5125845f342dafc53bef7e5ce8dd955affe2b0633048f6466597624c5a1c334e0e1b4c01d69e1fe049a333eac8e83e9ffdfdafc06aa98daf44d5f36bd372d411498
-
Filesize
158KB
MD594f744a2316a29c173b545e9e0ec3804
SHA1cc6c120055ec713ceadec403ab42cd97a86e4439
SHA256adca5050acb1d304726030e3ed6824061fab36e35439a9027d47eb3c04d7e7dc
SHA5125845f342dafc53bef7e5ce8dd955affe2b0633048f6466597624c5a1c334e0e1b4c01d69e1fe049a333eac8e83e9ffdfdafc06aa98daf44d5f36bd372d411498
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5363623d1a52f89430f97a57365781d39
SHA198600df89e7a4acc9ef1d7b49745024f202d5a62
SHA2562ff18b370776c32960bb1bdcec09429d9a0a581b29619a46aa2e60b42b3fe201
SHA512f2261e37a90db613ab59e80b30f224221999799b07d19ed816d28a90a781016685db69d89ffa965e33a1e7a4dc018b98376acbdb27b539e663b42d0e07875cb3
-
Filesize
106KB
MD5363623d1a52f89430f97a57365781d39
SHA198600df89e7a4acc9ef1d7b49745024f202d5a62
SHA2562ff18b370776c32960bb1bdcec09429d9a0a581b29619a46aa2e60b42b3fe201
SHA512f2261e37a90db613ab59e80b30f224221999799b07d19ed816d28a90a781016685db69d89ffa965e33a1e7a4dc018b98376acbdb27b539e663b42d0e07875cb3
-
Filesize
106KB
MD5363623d1a52f89430f97a57365781d39
SHA198600df89e7a4acc9ef1d7b49745024f202d5a62
SHA2562ff18b370776c32960bb1bdcec09429d9a0a581b29619a46aa2e60b42b3fe201
SHA512f2261e37a90db613ab59e80b30f224221999799b07d19ed816d28a90a781016685db69d89ffa965e33a1e7a4dc018b98376acbdb27b539e663b42d0e07875cb3
-
Filesize
241KB
MD5c077bda36ad7ad3d453ec62d6eca45e2
SHA1d02866501cc9cf41be09da8baff00e95c488d17a
SHA256024bd1d4b877cb1f749851a7f8b803d7e4ee181962cbec37b1416bf5cf680e9a
SHA512685982cd98fe8a36f092b0da50fc1046102104f37db965c4ba4115dcec9d4646711da0ffb1205e6aa6fd108c8c0986daff1d5ef3bf3b414da272325e7e6e68ef
-
Filesize
241KB
MD5c077bda36ad7ad3d453ec62d6eca45e2
SHA1d02866501cc9cf41be09da8baff00e95c488d17a
SHA256024bd1d4b877cb1f749851a7f8b803d7e4ee181962cbec37b1416bf5cf680e9a
SHA512685982cd98fe8a36f092b0da50fc1046102104f37db965c4ba4115dcec9d4646711da0ffb1205e6aa6fd108c8c0986daff1d5ef3bf3b414da272325e7e6e68ef
-
Filesize
108KB
MD590836769fec87e147bab5ae42da6e68a
SHA139a3784a15a6f2311f23519075764cd7ecfbfe4c
SHA256dd1da53d3e9eb0b3bf85514be735146051bf299323aebf7b99f41b5f5bb2646a
SHA5121dfafc841956a75aeade805b9734f98d4244704e4d31539fbc021eec3041c4f7460d3b920954c56c18969b4207424fbd285b4706d550b2885ab77e5067e5c656
-
Filesize
176KB
MD5f9e14fff604f0d483c905366768077a6
SHA18a51ee1ffc83eb091898b8724e97ff09698656ae
SHA256175fb1a1481693e7e2ea665fcb29a58a9f365515c402ea5d1da8a90320c73276
SHA512a02d2c2eb1f2a1504e83368caf674b822dc9526ac69e263678ebcf11c43ac0a2a7d2bfb9a83d206ec2740d05ae3a2ba782da8f9bd4785e4afc9b22a70b7f3243
-
Filesize
158KB
MD594f744a2316a29c173b545e9e0ec3804
SHA1cc6c120055ec713ceadec403ab42cd97a86e4439
SHA256adca5050acb1d304726030e3ed6824061fab36e35439a9027d47eb3c04d7e7dc
SHA5125845f342dafc53bef7e5ce8dd955affe2b0633048f6466597624c5a1c334e0e1b4c01d69e1fe049a333eac8e83e9ffdfdafc06aa98daf44d5f36bd372d411498