Analysis
-
max time kernel
48s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:16
Static task
static1
Behavioral task
behavioral1
Sample
aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe
Resource
win10v2004-20220812-en
General
-
Target
aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe
-
Size
602KB
-
MD5
111c300514f039fa3f94b00e46a09ea7
-
SHA1
d3fd41196859a71a8863e58c3da486e603027d32
-
SHA256
aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89
-
SHA512
091c30d066fc785dae717d609edaf6a13d6c47b18deb73d175d2bc820b4ede57b4df0887b3d68867a1e26f6fa817060b76db8d9b9bfc29db8efc0f1a640ad905
-
SSDEEP
12288:EIny5DYTkIrVUPUOGh+qtBAuq31Rltq8K2W6cW:iUTks3DtBA1nXoccW
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 1692 installd.exe 1656 nethtsrv.exe 1296 netupdsrv.exe 2012 nethtsrv.exe 1768 netupdsrv.exe -
Loads dropped DLL 13 IoCs
Processes:
aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exeinstalld.exenethtsrv.exenethtsrv.exepid process 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe 1692 installd.exe 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe 1656 nethtsrv.exe 1656 nethtsrv.exe 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe 2012 nethtsrv.exe 2012 nethtsrv.exe 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exedescription ioc process File created C:\Windows\SysWOW64\installd.exe aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe File created C:\Windows\SysWOW64\nethtsrv.exe aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe File created C:\Windows\SysWOW64\netupdsrv.exe aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe File created C:\Windows\SysWOW64\hfnapi.dll aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe File created C:\Windows\SysWOW64\hfpapi.dll aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe -
Drops file in Program Files directory 3 IoCs
Processes:
aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\data.xml aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 472 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 2012 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1288 wrote to memory of 816 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe net.exe PID 1288 wrote to memory of 816 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe net.exe PID 1288 wrote to memory of 816 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe net.exe PID 1288 wrote to memory of 816 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe net.exe PID 816 wrote to memory of 1728 816 net.exe net1.exe PID 816 wrote to memory of 1728 816 net.exe net1.exe PID 816 wrote to memory of 1728 816 net.exe net1.exe PID 816 wrote to memory of 1728 816 net.exe net1.exe PID 1288 wrote to memory of 372 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe net.exe PID 1288 wrote to memory of 372 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe net.exe PID 1288 wrote to memory of 372 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe net.exe PID 1288 wrote to memory of 372 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe net.exe PID 372 wrote to memory of 1756 372 net.exe net1.exe PID 372 wrote to memory of 1756 372 net.exe net1.exe PID 372 wrote to memory of 1756 372 net.exe net1.exe PID 372 wrote to memory of 1756 372 net.exe net1.exe PID 1288 wrote to memory of 1692 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe installd.exe PID 1288 wrote to memory of 1692 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe installd.exe PID 1288 wrote to memory of 1692 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe installd.exe PID 1288 wrote to memory of 1692 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe installd.exe PID 1288 wrote to memory of 1692 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe installd.exe PID 1288 wrote to memory of 1692 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe installd.exe PID 1288 wrote to memory of 1692 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe installd.exe PID 1288 wrote to memory of 1656 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe nethtsrv.exe PID 1288 wrote to memory of 1656 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe nethtsrv.exe PID 1288 wrote to memory of 1656 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe nethtsrv.exe PID 1288 wrote to memory of 1656 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe nethtsrv.exe PID 1288 wrote to memory of 1296 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe netupdsrv.exe PID 1288 wrote to memory of 1296 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe netupdsrv.exe PID 1288 wrote to memory of 1296 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe netupdsrv.exe PID 1288 wrote to memory of 1296 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe netupdsrv.exe PID 1288 wrote to memory of 1296 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe netupdsrv.exe PID 1288 wrote to memory of 1296 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe netupdsrv.exe PID 1288 wrote to memory of 1296 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe netupdsrv.exe PID 1288 wrote to memory of 1044 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe net.exe PID 1288 wrote to memory of 1044 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe net.exe PID 1288 wrote to memory of 1044 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe net.exe PID 1288 wrote to memory of 1044 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe net.exe PID 1044 wrote to memory of 2028 1044 net.exe net1.exe PID 1044 wrote to memory of 2028 1044 net.exe net1.exe PID 1044 wrote to memory of 2028 1044 net.exe net1.exe PID 1044 wrote to memory of 2028 1044 net.exe net1.exe PID 1288 wrote to memory of 1668 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe net.exe PID 1288 wrote to memory of 1668 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe net.exe PID 1288 wrote to memory of 1668 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe net.exe PID 1288 wrote to memory of 1668 1288 aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe net.exe PID 1668 wrote to memory of 740 1668 net.exe net1.exe PID 1668 wrote to memory of 740 1668 net.exe net1.exe PID 1668 wrote to memory of 740 1668 net.exe net1.exe PID 1668 wrote to memory of 740 1668 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe"C:\Users\Admin\AppData\Local\Temp\aa584df13a96e262ae0d877799d392ee9b29411f5f891fe2a2f1bd9de57d8a89.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1728
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1756
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1296 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:2028
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:740
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:1768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5d1784429902895d518c838ac1d935657
SHA1378db13b7e32dc397d127513af88a8cf1127c81d
SHA256310d7f6db5bbc1438528cce859aa1484ac8efb20ee9901b4ba5eabcbf7f60b8e
SHA512a115bdc70aea9cd306d9c3d5b777a3caddfbfd9a8e107638b0dba1116038c299e4dd1799c2708124a2c20a3cc58a7cbf3c5a323bf81ce1c0183fd303fdc0aeea
-
Filesize
244KB
MD52b4810378cba9365aa25395f0e25924b
SHA1c8db7b389b3264cd5f65f5f4fa177d16fc01a5c3
SHA256fa9e4912a3493b7c5bf45cd57ce9f59a9679513436e278fbb91ae8246640de07
SHA512d8435835462fab9acd0a6220e6e32f7303767516f0ae38497a064ffc91d2c8afc18f04b0554eef6a17429d038556a7c460ca9c594ddbfacc8f4c145c98a9fcb4
-
Filesize
108KB
MD5b42b9d96272aa433ffce51af250df652
SHA1e0e21b0d410f3ce6aa52aeed4d27c4969f01db6c
SHA256f2c14c10678a199d91e2b07baa8f1f977ca14b1a83a91fed892ddf1dda96644c
SHA512dfae4f83de990bab22bf6f49f0c43a81d03135ec0ee62957d851930caf51e651e0dbe1dca880fce2644e5dc1fc40cd38e498027d3e2429141ed6f4ef2b364731
-
Filesize
176KB
MD542fc9daa59064a8e663d78d3caa2447c
SHA1ceb5cf16b1140ae1e54b13f109fc978b81332c63
SHA2562602abe96374741a9d06f96f00e696e6b95db4f0c7f092ac8674c7a5de83ec53
SHA512f0184dfe973a9ac14742a47948b379a7ddc436a586b56779bd762769dd81b0af9ee71697a13967652b4926d68f75dc25265ecf26964a470d51093dc986b81ed2
-
Filesize
176KB
MD542fc9daa59064a8e663d78d3caa2447c
SHA1ceb5cf16b1140ae1e54b13f109fc978b81332c63
SHA2562602abe96374741a9d06f96f00e696e6b95db4f0c7f092ac8674c7a5de83ec53
SHA512f0184dfe973a9ac14742a47948b379a7ddc436a586b56779bd762769dd81b0af9ee71697a13967652b4926d68f75dc25265ecf26964a470d51093dc986b81ed2
-
Filesize
158KB
MD511d5e0fa1a8b82141704c773341d20cf
SHA1bac0e857cfd4c046137b8b11edea9289d59df6b3
SHA256f31561a0bc000fc6673599ad12d1c5d5e8327686fc76fcd2b4af07c77691529b
SHA512c81802584478eec7d9e734caf2438decb74ad75c6c50d6c08adbc9af664ce4dbda33b53e4af3ecb38e7ba843c32daea0a668d94cf9f8e2bee9cc468906daaae1
-
Filesize
158KB
MD511d5e0fa1a8b82141704c773341d20cf
SHA1bac0e857cfd4c046137b8b11edea9289d59df6b3
SHA256f31561a0bc000fc6673599ad12d1c5d5e8327686fc76fcd2b4af07c77691529b
SHA512c81802584478eec7d9e734caf2438decb74ad75c6c50d6c08adbc9af664ce4dbda33b53e4af3ecb38e7ba843c32daea0a668d94cf9f8e2bee9cc468906daaae1
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5d1784429902895d518c838ac1d935657
SHA1378db13b7e32dc397d127513af88a8cf1127c81d
SHA256310d7f6db5bbc1438528cce859aa1484ac8efb20ee9901b4ba5eabcbf7f60b8e
SHA512a115bdc70aea9cd306d9c3d5b777a3caddfbfd9a8e107638b0dba1116038c299e4dd1799c2708124a2c20a3cc58a7cbf3c5a323bf81ce1c0183fd303fdc0aeea
-
Filesize
106KB
MD5d1784429902895d518c838ac1d935657
SHA1378db13b7e32dc397d127513af88a8cf1127c81d
SHA256310d7f6db5bbc1438528cce859aa1484ac8efb20ee9901b4ba5eabcbf7f60b8e
SHA512a115bdc70aea9cd306d9c3d5b777a3caddfbfd9a8e107638b0dba1116038c299e4dd1799c2708124a2c20a3cc58a7cbf3c5a323bf81ce1c0183fd303fdc0aeea
-
Filesize
106KB
MD5d1784429902895d518c838ac1d935657
SHA1378db13b7e32dc397d127513af88a8cf1127c81d
SHA256310d7f6db5bbc1438528cce859aa1484ac8efb20ee9901b4ba5eabcbf7f60b8e
SHA512a115bdc70aea9cd306d9c3d5b777a3caddfbfd9a8e107638b0dba1116038c299e4dd1799c2708124a2c20a3cc58a7cbf3c5a323bf81ce1c0183fd303fdc0aeea
-
Filesize
244KB
MD52b4810378cba9365aa25395f0e25924b
SHA1c8db7b389b3264cd5f65f5f4fa177d16fc01a5c3
SHA256fa9e4912a3493b7c5bf45cd57ce9f59a9679513436e278fbb91ae8246640de07
SHA512d8435835462fab9acd0a6220e6e32f7303767516f0ae38497a064ffc91d2c8afc18f04b0554eef6a17429d038556a7c460ca9c594ddbfacc8f4c145c98a9fcb4
-
Filesize
244KB
MD52b4810378cba9365aa25395f0e25924b
SHA1c8db7b389b3264cd5f65f5f4fa177d16fc01a5c3
SHA256fa9e4912a3493b7c5bf45cd57ce9f59a9679513436e278fbb91ae8246640de07
SHA512d8435835462fab9acd0a6220e6e32f7303767516f0ae38497a064ffc91d2c8afc18f04b0554eef6a17429d038556a7c460ca9c594ddbfacc8f4c145c98a9fcb4
-
Filesize
108KB
MD5b42b9d96272aa433ffce51af250df652
SHA1e0e21b0d410f3ce6aa52aeed4d27c4969f01db6c
SHA256f2c14c10678a199d91e2b07baa8f1f977ca14b1a83a91fed892ddf1dda96644c
SHA512dfae4f83de990bab22bf6f49f0c43a81d03135ec0ee62957d851930caf51e651e0dbe1dca880fce2644e5dc1fc40cd38e498027d3e2429141ed6f4ef2b364731
-
Filesize
176KB
MD542fc9daa59064a8e663d78d3caa2447c
SHA1ceb5cf16b1140ae1e54b13f109fc978b81332c63
SHA2562602abe96374741a9d06f96f00e696e6b95db4f0c7f092ac8674c7a5de83ec53
SHA512f0184dfe973a9ac14742a47948b379a7ddc436a586b56779bd762769dd81b0af9ee71697a13967652b4926d68f75dc25265ecf26964a470d51093dc986b81ed2
-
Filesize
158KB
MD511d5e0fa1a8b82141704c773341d20cf
SHA1bac0e857cfd4c046137b8b11edea9289d59df6b3
SHA256f31561a0bc000fc6673599ad12d1c5d5e8327686fc76fcd2b4af07c77691529b
SHA512c81802584478eec7d9e734caf2438decb74ad75c6c50d6c08adbc9af664ce4dbda33b53e4af3ecb38e7ba843c32daea0a668d94cf9f8e2bee9cc468906daaae1