Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe
Resource
win10v2004-20220812-en
General
-
Target
ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe
-
Size
561KB
-
MD5
91ea20693df39310755bcf687a63bd48
-
SHA1
43ba30ff58882a4ad756afe8780d29d2b7891a97
-
SHA256
ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51
-
SHA512
ba3f076b2c5ea14c42d76ba5635f2e34a0df00977b993e803181851145d45934a2fc80f14fa2aef925c47fa9f1aa27ade612375b2b9c79eb9737731cebf08197
-
SSDEEP
12288:TPRYzEbfe8HpA5aNQiOrplv0mQoXbKZMpCBlvL5dNbT:OzwfB4jlvrXbKPvLvNbT
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe -
Executes dropped EXE 5 IoCs
pid Process 712 installd.exe 2620 nethtsrv.exe 5052 netupdsrv.exe 2356 nethtsrv.exe 204 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 712 installd.exe 2620 nethtsrv.exe 2620 nethtsrv.exe 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 2356 nethtsrv.exe 2356 nethtsrv.exe 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe File created C:\Windows\SysWOW64\hfpapi.dll ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe File created C:\Windows\SysWOW64\installd.exe ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe File created C:\Windows\SysWOW64\nethtsrv.exe ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe File created C:\Windows\SysWOW64\netupdsrv.exe ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\ver.xml ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe File created C:\Program Files (x86)\Common Files\Config\data.xml ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2356 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4736 wrote to memory of 2016 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 81 PID 4736 wrote to memory of 2016 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 81 PID 4736 wrote to memory of 2016 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 81 PID 2016 wrote to memory of 3020 2016 net.exe 83 PID 2016 wrote to memory of 3020 2016 net.exe 83 PID 2016 wrote to memory of 3020 2016 net.exe 83 PID 4736 wrote to memory of 1444 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 84 PID 4736 wrote to memory of 1444 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 84 PID 4736 wrote to memory of 1444 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 84 PID 1444 wrote to memory of 2892 1444 net.exe 86 PID 1444 wrote to memory of 2892 1444 net.exe 86 PID 1444 wrote to memory of 2892 1444 net.exe 86 PID 4736 wrote to memory of 712 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 87 PID 4736 wrote to memory of 712 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 87 PID 4736 wrote to memory of 712 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 87 PID 4736 wrote to memory of 2620 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 88 PID 4736 wrote to memory of 2620 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 88 PID 4736 wrote to memory of 2620 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 88 PID 4736 wrote to memory of 5052 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 90 PID 4736 wrote to memory of 5052 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 90 PID 4736 wrote to memory of 5052 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 90 PID 4736 wrote to memory of 1924 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 92 PID 4736 wrote to memory of 1924 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 92 PID 4736 wrote to memory of 1924 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 92 PID 1924 wrote to memory of 1716 1924 net.exe 94 PID 1924 wrote to memory of 1716 1924 net.exe 94 PID 1924 wrote to memory of 1716 1924 net.exe 94 PID 4736 wrote to memory of 1604 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 96 PID 4736 wrote to memory of 1604 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 96 PID 4736 wrote to memory of 1604 4736 ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe 96 PID 1604 wrote to memory of 3356 1604 net.exe 98 PID 1604 wrote to memory of 3356 1604 net.exe 98 PID 1604 wrote to memory of 3356 1604 net.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe"C:\Users\Admin\AppData\Local\Temp\ba9bd79a9cc8ec12bbe71e60f091bb8c8d7bc8a4f98fc6df6d2eb8475360cd51.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:3020
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:2892
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:712
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2620
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:5052
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1716
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:3356
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD525e154afa7cb45b9e87d78c39fe86131
SHA1ac25d49a2b3812d08d0c6c094d204df216ae9460
SHA25645e5794bc920e48d33151dd7ca6651bd35bf6ba3a5b65da9ec2d06784196db0f
SHA512046b3d55766d63bc5835e8c48bab98051a90c0a3a81277f3bfb19a03b279fce7380af6257b5db9455d7bfe64adc083b0ca94828658338ce8d720969f89a4ca67
-
Filesize
106KB
MD525e154afa7cb45b9e87d78c39fe86131
SHA1ac25d49a2b3812d08d0c6c094d204df216ae9460
SHA25645e5794bc920e48d33151dd7ca6651bd35bf6ba3a5b65da9ec2d06784196db0f
SHA512046b3d55766d63bc5835e8c48bab98051a90c0a3a81277f3bfb19a03b279fce7380af6257b5db9455d7bfe64adc083b0ca94828658338ce8d720969f89a4ca67
-
Filesize
106KB
MD525e154afa7cb45b9e87d78c39fe86131
SHA1ac25d49a2b3812d08d0c6c094d204df216ae9460
SHA25645e5794bc920e48d33151dd7ca6651bd35bf6ba3a5b65da9ec2d06784196db0f
SHA512046b3d55766d63bc5835e8c48bab98051a90c0a3a81277f3bfb19a03b279fce7380af6257b5db9455d7bfe64adc083b0ca94828658338ce8d720969f89a4ca67
-
Filesize
106KB
MD525e154afa7cb45b9e87d78c39fe86131
SHA1ac25d49a2b3812d08d0c6c094d204df216ae9460
SHA25645e5794bc920e48d33151dd7ca6651bd35bf6ba3a5b65da9ec2d06784196db0f
SHA512046b3d55766d63bc5835e8c48bab98051a90c0a3a81277f3bfb19a03b279fce7380af6257b5db9455d7bfe64adc083b0ca94828658338ce8d720969f89a4ca67
-
Filesize
244KB
MD5abe16d0f1dee5e2ae840940eac4edac4
SHA14f96b1632b36ccfba601a9a5d47b8478e49249b3
SHA2567b52a4c4ac88d7b9785a895688463ba9e37d922645a40bf6d43de9ef40be6ea9
SHA5129c731f0e5ccb5f75944f81d7f83e641e630a2990cb30e1263f2f6cf7ca7932f963d42667e15d9ea6def8155d40ce3925a4ca00c9587c9c6aebadcacf6e333c31
-
Filesize
244KB
MD5abe16d0f1dee5e2ae840940eac4edac4
SHA14f96b1632b36ccfba601a9a5d47b8478e49249b3
SHA2567b52a4c4ac88d7b9785a895688463ba9e37d922645a40bf6d43de9ef40be6ea9
SHA5129c731f0e5ccb5f75944f81d7f83e641e630a2990cb30e1263f2f6cf7ca7932f963d42667e15d9ea6def8155d40ce3925a4ca00c9587c9c6aebadcacf6e333c31
-
Filesize
244KB
MD5abe16d0f1dee5e2ae840940eac4edac4
SHA14f96b1632b36ccfba601a9a5d47b8478e49249b3
SHA2567b52a4c4ac88d7b9785a895688463ba9e37d922645a40bf6d43de9ef40be6ea9
SHA5129c731f0e5ccb5f75944f81d7f83e641e630a2990cb30e1263f2f6cf7ca7932f963d42667e15d9ea6def8155d40ce3925a4ca00c9587c9c6aebadcacf6e333c31
-
Filesize
108KB
MD5094cb958a131177c374c5abf6e82ba3b
SHA1c38f1a9a31712afc1bd791738c4768f86e831e93
SHA256c15f409f87cb42c0d0848a6bfd44bf25a5dd7de32b1e1894b4def4bef94b90b2
SHA512e338713686cb482a2b3f05a37d00fd0ce6a7152b678789323f66cb475138f884ad16bcfd3b5bb84cb010f0071e2fbd1ec5d4b612a0e38a862b7b8771788f4657
-
Filesize
108KB
MD5094cb958a131177c374c5abf6e82ba3b
SHA1c38f1a9a31712afc1bd791738c4768f86e831e93
SHA256c15f409f87cb42c0d0848a6bfd44bf25a5dd7de32b1e1894b4def4bef94b90b2
SHA512e338713686cb482a2b3f05a37d00fd0ce6a7152b678789323f66cb475138f884ad16bcfd3b5bb84cb010f0071e2fbd1ec5d4b612a0e38a862b7b8771788f4657
-
Filesize
176KB
MD5bfc3b222cbbbcd3a407a905fc94ad485
SHA1b877e4e50edd3df9c33e493a1d17ebf26adf8aeb
SHA256c5c44c8277e98075f0ed6f5c684c2db8721b97b2534fd23ba2507e2f0a7363d9
SHA51259c9c02ac4980de1ad1a095074e8402111ff34ae278abb2cbb2d0979612fae0da581059ff0a36b728f3f1d014c72aaeecb6fc13348d917bd6c8ac7ed21109a8d
-
Filesize
176KB
MD5bfc3b222cbbbcd3a407a905fc94ad485
SHA1b877e4e50edd3df9c33e493a1d17ebf26adf8aeb
SHA256c5c44c8277e98075f0ed6f5c684c2db8721b97b2534fd23ba2507e2f0a7363d9
SHA51259c9c02ac4980de1ad1a095074e8402111ff34ae278abb2cbb2d0979612fae0da581059ff0a36b728f3f1d014c72aaeecb6fc13348d917bd6c8ac7ed21109a8d
-
Filesize
176KB
MD5bfc3b222cbbbcd3a407a905fc94ad485
SHA1b877e4e50edd3df9c33e493a1d17ebf26adf8aeb
SHA256c5c44c8277e98075f0ed6f5c684c2db8721b97b2534fd23ba2507e2f0a7363d9
SHA51259c9c02ac4980de1ad1a095074e8402111ff34ae278abb2cbb2d0979612fae0da581059ff0a36b728f3f1d014c72aaeecb6fc13348d917bd6c8ac7ed21109a8d
-
Filesize
158KB
MD503ad47e4d79a23f4d29f337e6e49af37
SHA18405ac038d3676a7891f6f0d7e22ddb9b0a8a169
SHA256ead08a5195eb2f8c50d389c9eced2e7fb57d3f63dd439b73a75ffbba2b7656c9
SHA5124e43126517a11bc64540f1a7afc3f4bcac35063d2b335486ff0ff746cd67217735f4d0da171442bf8064e3fe0f302ea281f9407ec3aa4fad9c5ab4b0a30bed82
-
Filesize
158KB
MD503ad47e4d79a23f4d29f337e6e49af37
SHA18405ac038d3676a7891f6f0d7e22ddb9b0a8a169
SHA256ead08a5195eb2f8c50d389c9eced2e7fb57d3f63dd439b73a75ffbba2b7656c9
SHA5124e43126517a11bc64540f1a7afc3f4bcac35063d2b335486ff0ff746cd67217735f4d0da171442bf8064e3fe0f302ea281f9407ec3aa4fad9c5ab4b0a30bed82
-
Filesize
158KB
MD503ad47e4d79a23f4d29f337e6e49af37
SHA18405ac038d3676a7891f6f0d7e22ddb9b0a8a169
SHA256ead08a5195eb2f8c50d389c9eced2e7fb57d3f63dd439b73a75ffbba2b7656c9
SHA5124e43126517a11bc64540f1a7afc3f4bcac35063d2b335486ff0ff746cd67217735f4d0da171442bf8064e3fe0f302ea281f9407ec3aa4fad9c5ab4b0a30bed82