Analysis
-
max time kernel
167s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:32
Static task
static1
Behavioral task
behavioral1
Sample
1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe
Resource
win10v2004-20221111-en
General
-
Target
1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe
-
Size
603KB
-
MD5
8e2504633b6fd960a05732b6690648c2
-
SHA1
a3d48be96631642d5080493ea7aa0ab4128ef978
-
SHA256
1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539
-
SHA512
9c77f4d4b07d59dd6a56477a716a60e22cc4191173403537103559be0b75abca051327dd4cb6ad15fffad170bb61a6de2eaca8622344366d278865b6b45ddb26
-
SSDEEP
12288:1Iny5DYTTAhS+YiW2njM+IFHJkfzteSIyEePW:BUTTArRWNPkpIyEePW
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 1940 installd.exe 2664 nethtsrv.exe 924 netupdsrv.exe 444 nethtsrv.exe 3596 netupdsrv.exe -
Loads dropped DLL 14 IoCs
Processes:
1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exeinstalld.exenethtsrv.exenethtsrv.exepid process 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe 1940 installd.exe 2664 nethtsrv.exe 2664 nethtsrv.exe 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe 444 nethtsrv.exe 444 nethtsrv.exe 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exedescription ioc process File created C:\Windows\SysWOW64\nethtsrv.exe 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe File created C:\Windows\SysWOW64\netupdsrv.exe 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe File created C:\Windows\SysWOW64\hfnapi.dll 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe File created C:\Windows\SysWOW64\hfpapi.dll 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe File created C:\Windows\SysWOW64\installd.exe 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe -
Drops file in Program Files directory 3 IoCs
Processes:
1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\data.xml 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
Processes:
nethtsrv.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 668 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 444 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exenet.exenet.exenet.exenet.exedescription pid process target process PID 2676 wrote to memory of 632 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe net.exe PID 2676 wrote to memory of 632 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe net.exe PID 2676 wrote to memory of 632 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe net.exe PID 632 wrote to memory of 316 632 net.exe net1.exe PID 632 wrote to memory of 316 632 net.exe net1.exe PID 632 wrote to memory of 316 632 net.exe net1.exe PID 2676 wrote to memory of 4224 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe net.exe PID 2676 wrote to memory of 4224 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe net.exe PID 2676 wrote to memory of 4224 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe net.exe PID 4224 wrote to memory of 4436 4224 net.exe net1.exe PID 4224 wrote to memory of 4436 4224 net.exe net1.exe PID 4224 wrote to memory of 4436 4224 net.exe net1.exe PID 2676 wrote to memory of 1940 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe installd.exe PID 2676 wrote to memory of 1940 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe installd.exe PID 2676 wrote to memory of 1940 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe installd.exe PID 2676 wrote to memory of 2664 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe nethtsrv.exe PID 2676 wrote to memory of 2664 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe nethtsrv.exe PID 2676 wrote to memory of 2664 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe nethtsrv.exe PID 2676 wrote to memory of 924 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe netupdsrv.exe PID 2676 wrote to memory of 924 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe netupdsrv.exe PID 2676 wrote to memory of 924 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe netupdsrv.exe PID 2676 wrote to memory of 2096 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe net.exe PID 2676 wrote to memory of 2096 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe net.exe PID 2676 wrote to memory of 2096 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe net.exe PID 2096 wrote to memory of 3360 2096 net.exe net1.exe PID 2096 wrote to memory of 3360 2096 net.exe net1.exe PID 2096 wrote to memory of 3360 2096 net.exe net1.exe PID 2676 wrote to memory of 1456 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe net.exe PID 2676 wrote to memory of 1456 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe net.exe PID 2676 wrote to memory of 1456 2676 1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe net.exe PID 1456 wrote to memory of 3504 1456 net.exe net1.exe PID 1456 wrote to memory of 3504 1456 net.exe net1.exe PID 1456 wrote to memory of 3504 1456 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe"C:\Users\Admin\AppData\Local\Temp\1bd6e6171ce88274fe171b0217ce2f13c327d4595653bac15b2d38dc28cb2539.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:316
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:4436
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1940 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2664 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:924 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:3360
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:3504
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:444
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:3596
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD5afd62768123a6b7d7341756cf9e99c6a
SHA1ccc5cbdcb8a4016e584761be083c15d91f35da73
SHA2560c7c13160746f43911cf8488cc0bae01695d13a02729b541b0643a98e5d03361
SHA51201a3dddd45f6ea3477cb56f589c915c7dd849c047fcc124608a6a3fe7c22e9d4e46086c73fe57887a7e5bcf7b25efee34e3ffdc255bd860abc8844e6c456ab4b
-
Filesize
106KB
MD5afd62768123a6b7d7341756cf9e99c6a
SHA1ccc5cbdcb8a4016e584761be083c15d91f35da73
SHA2560c7c13160746f43911cf8488cc0bae01695d13a02729b541b0643a98e5d03361
SHA51201a3dddd45f6ea3477cb56f589c915c7dd849c047fcc124608a6a3fe7c22e9d4e46086c73fe57887a7e5bcf7b25efee34e3ffdc255bd860abc8844e6c456ab4b
-
Filesize
106KB
MD5afd62768123a6b7d7341756cf9e99c6a
SHA1ccc5cbdcb8a4016e584761be083c15d91f35da73
SHA2560c7c13160746f43911cf8488cc0bae01695d13a02729b541b0643a98e5d03361
SHA51201a3dddd45f6ea3477cb56f589c915c7dd849c047fcc124608a6a3fe7c22e9d4e46086c73fe57887a7e5bcf7b25efee34e3ffdc255bd860abc8844e6c456ab4b
-
Filesize
106KB
MD5afd62768123a6b7d7341756cf9e99c6a
SHA1ccc5cbdcb8a4016e584761be083c15d91f35da73
SHA2560c7c13160746f43911cf8488cc0bae01695d13a02729b541b0643a98e5d03361
SHA51201a3dddd45f6ea3477cb56f589c915c7dd849c047fcc124608a6a3fe7c22e9d4e46086c73fe57887a7e5bcf7b25efee34e3ffdc255bd860abc8844e6c456ab4b
-
Filesize
244KB
MD5826d506483c4f5f1fb8489d7c5235c6f
SHA187d393b391d54c4a958925230e812ca8e2d5c4e3
SHA256277832524f3778b520eba0d108a559494d0a8a825806759cbb8a8d510a43c0d4
SHA5126a72901c2bdddd991886784dba725cdd8fae2a95747f63b33081a736cb3b0500c554170c3767ef52ad198424c626d9dd886d287c49d06b577b5ddcc68207b930
-
Filesize
244KB
MD5826d506483c4f5f1fb8489d7c5235c6f
SHA187d393b391d54c4a958925230e812ca8e2d5c4e3
SHA256277832524f3778b520eba0d108a559494d0a8a825806759cbb8a8d510a43c0d4
SHA5126a72901c2bdddd991886784dba725cdd8fae2a95747f63b33081a736cb3b0500c554170c3767ef52ad198424c626d9dd886d287c49d06b577b5ddcc68207b930
-
Filesize
244KB
MD5826d506483c4f5f1fb8489d7c5235c6f
SHA187d393b391d54c4a958925230e812ca8e2d5c4e3
SHA256277832524f3778b520eba0d108a559494d0a8a825806759cbb8a8d510a43c0d4
SHA5126a72901c2bdddd991886784dba725cdd8fae2a95747f63b33081a736cb3b0500c554170c3767ef52ad198424c626d9dd886d287c49d06b577b5ddcc68207b930
-
Filesize
108KB
MD5d957897947f0ca2dd873f7c5f8c31889
SHA1234f499c4fbd3518b065332a4baec41958fe0ed2
SHA25658df19cef1965655578e3dfbd8a3c5b19634cee3e2112889dcf2eed764cc6659
SHA512f11439951355d3e0f1c362d5a7041096a92f4866664f9de21d6ec3946e40ba451a474f544311be37a65b60a2510cb06f34a4a079169b1708d2491932fd48eeb1
-
Filesize
108KB
MD5d957897947f0ca2dd873f7c5f8c31889
SHA1234f499c4fbd3518b065332a4baec41958fe0ed2
SHA25658df19cef1965655578e3dfbd8a3c5b19634cee3e2112889dcf2eed764cc6659
SHA512f11439951355d3e0f1c362d5a7041096a92f4866664f9de21d6ec3946e40ba451a474f544311be37a65b60a2510cb06f34a4a079169b1708d2491932fd48eeb1
-
Filesize
176KB
MD56cf7b85fea0a6073436f33f617b07bd1
SHA1a07026b02d468b2fc202a72a7f33fd0b1ba7a8f9
SHA25667bbddf3a81fdabb823694200b085d09eaf513c03d3dbea7f6d4d7534d492b0c
SHA512ab0bc380b7054ea8e449aac056c875e27ec3a1ec1bdef358e95d55ba59cec8ff5b6d35b18c5fc39c4dcb62738ed50ade6ccbcfd07d1308d210afb70e8e9140e0
-
Filesize
176KB
MD56cf7b85fea0a6073436f33f617b07bd1
SHA1a07026b02d468b2fc202a72a7f33fd0b1ba7a8f9
SHA25667bbddf3a81fdabb823694200b085d09eaf513c03d3dbea7f6d4d7534d492b0c
SHA512ab0bc380b7054ea8e449aac056c875e27ec3a1ec1bdef358e95d55ba59cec8ff5b6d35b18c5fc39c4dcb62738ed50ade6ccbcfd07d1308d210afb70e8e9140e0
-
Filesize
176KB
MD56cf7b85fea0a6073436f33f617b07bd1
SHA1a07026b02d468b2fc202a72a7f33fd0b1ba7a8f9
SHA25667bbddf3a81fdabb823694200b085d09eaf513c03d3dbea7f6d4d7534d492b0c
SHA512ab0bc380b7054ea8e449aac056c875e27ec3a1ec1bdef358e95d55ba59cec8ff5b6d35b18c5fc39c4dcb62738ed50ade6ccbcfd07d1308d210afb70e8e9140e0
-
Filesize
159KB
MD59ed57503583f90d9ba7396677c2f012e
SHA1c2b294a72104fd948d7a3c35b208dfe1bb840eea
SHA25607e829e0b95c5c10ffa5ba4bdba2b29da2727a819479beeceab0c2eb2201f0db
SHA51202c05abb84b81c07bef7ab30975bf52f55427e57401e498401b3bbbb32f6ae8d4ca1bd790e229b0ecc4a14c95c23a7ccb3f260407623530ac8ef16c1b5a3c5ea
-
Filesize
159KB
MD59ed57503583f90d9ba7396677c2f012e
SHA1c2b294a72104fd948d7a3c35b208dfe1bb840eea
SHA25607e829e0b95c5c10ffa5ba4bdba2b29da2727a819479beeceab0c2eb2201f0db
SHA51202c05abb84b81c07bef7ab30975bf52f55427e57401e498401b3bbbb32f6ae8d4ca1bd790e229b0ecc4a14c95c23a7ccb3f260407623530ac8ef16c1b5a3c5ea
-
Filesize
159KB
MD59ed57503583f90d9ba7396677c2f012e
SHA1c2b294a72104fd948d7a3c35b208dfe1bb840eea
SHA25607e829e0b95c5c10ffa5ba4bdba2b29da2727a819479beeceab0c2eb2201f0db
SHA51202c05abb84b81c07bef7ab30975bf52f55427e57401e498401b3bbbb32f6ae8d4ca1bd790e229b0ecc4a14c95c23a7ccb3f260407623530ac8ef16c1b5a3c5ea