Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2023, 16:26
Behavioral task
behavioral1
Sample
2462e26144fa12fd2ca9dce4d2c13420.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2462e26144fa12fd2ca9dce4d2c13420.exe
Resource
win10v2004-20230220-en
General
-
Target
2462e26144fa12fd2ca9dce4d2c13420.exe
-
Size
1002KB
-
MD5
2462e26144fa12fd2ca9dce4d2c13420
-
SHA1
39151c10b343122006aaa172f1f1554a38137528
-
SHA256
6fe3e7b8886862e6c2e9ea8684396da80e57ca2c1f85026e7edc0ae6cef80c35
-
SHA512
d9dc3df7635afd99e49f2851443ab274063badbfb3382eab4fdf373c5a5aede7d3755f009000bc6dd3a6318bf158e8c4bd00999cb1a09cfbb5239b513ea858ca
-
SSDEEP
24576:IxBKgJkikTpvNX6Uc3GawHa/Z2twSbIAflddj6T:IiXLv8UAw6/oPEudj6
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 39 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1112 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 728 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2220 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3460 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3796 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1896 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3972 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 224 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3340 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4692 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2296 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4088 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4076 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3024 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4484 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3960 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1760 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 796 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1372 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2976 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4460 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4812 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3716 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 744 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2620 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4156 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4924 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 768 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3284 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1568 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1392 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4640 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3356 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2340 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3872 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2344 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4124 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4200 4712 schtasks.exe 50 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3692 4712 schtasks.exe 50 -
resource yara_rule behavioral2/memory/2076-133-0x0000000000780000-0x0000000000882000-memory.dmp dcrat behavioral2/files/0x00010000000230ee-144.dat dcrat behavioral2/files/0x00010000000230fc-170.dat dcrat behavioral2/files/0x00010000000230fc-172.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation 2462e26144fa12fd2ca9dce4d2c13420.exe -
Executes dropped EXE 1 IoCs
pid Process 3012 backgroundTaskHost.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files\Windows Security\BrowserCore\en-US\9e8d7a4ca61bd9 2462e26144fa12fd2ca9dce4d2c13420.exe File created C:\Program Files\Java\jdk1.8.0_66\db\lib\WmiPrvSE.exe 2462e26144fa12fd2ca9dce4d2c13420.exe File created C:\Program Files\Java\jdk1.8.0_66\db\lib\24dbde2999530e 2462e26144fa12fd2ca9dce4d2c13420.exe File created C:\Program Files\Windows Sidebar\backgroundTaskHost.exe 2462e26144fa12fd2ca9dce4d2c13420.exe File opened for modification C:\Program Files\Windows Sidebar\backgroundTaskHost.exe 2462e26144fa12fd2ca9dce4d2c13420.exe File created C:\Program Files\Windows Sidebar\eddb19405b7ce1 2462e26144fa12fd2ca9dce4d2c13420.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\RuntimeBroker.exe 2462e26144fa12fd2ca9dce4d2c13420.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\diagnostics\SppExtComObj.exe 2462e26144fa12fd2ca9dce4d2c13420.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 39 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4924 schtasks.exe 4200 schtasks.exe 3796 schtasks.exe 3972 schtasks.exe 2620 schtasks.exe 796 schtasks.exe 4156 schtasks.exe 3872 schtasks.exe 728 schtasks.exe 224 schtasks.exe 4088 schtasks.exe 4812 schtasks.exe 744 schtasks.exe 1392 schtasks.exe 3460 schtasks.exe 4692 schtasks.exe 1760 schtasks.exe 4640 schtasks.exe 2344 schtasks.exe 2296 schtasks.exe 3960 schtasks.exe 768 schtasks.exe 4076 schtasks.exe 4460 schtasks.exe 2340 schtasks.exe 3340 schtasks.exe 1568 schtasks.exe 3692 schtasks.exe 3716 schtasks.exe 3356 schtasks.exe 4124 schtasks.exe 1112 schtasks.exe 4484 schtasks.exe 1372 schtasks.exe 2976 schtasks.exe 3284 schtasks.exe 2220 schtasks.exe 1896 schtasks.exe 3024 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2076 2462e26144fa12fd2ca9dce4d2c13420.exe 2076 2462e26144fa12fd2ca9dce4d2c13420.exe 2076 2462e26144fa12fd2ca9dce4d2c13420.exe 2076 2462e26144fa12fd2ca9dce4d2c13420.exe 2076 2462e26144fa12fd2ca9dce4d2c13420.exe 3012 backgroundTaskHost.exe 3012 backgroundTaskHost.exe 3012 backgroundTaskHost.exe 3012 backgroundTaskHost.exe 3012 backgroundTaskHost.exe 3012 backgroundTaskHost.exe 3012 backgroundTaskHost.exe 3012 backgroundTaskHost.exe 3012 backgroundTaskHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3012 backgroundTaskHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2076 2462e26144fa12fd2ca9dce4d2c13420.exe Token: SeDebugPrivilege 3012 backgroundTaskHost.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2076 wrote to memory of 3012 2076 2462e26144fa12fd2ca9dce4d2c13420.exe 126 PID 2076 wrote to memory of 3012 2076 2462e26144fa12fd2ca9dce4d2c13420.exe 126 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2462e26144fa12fd2ca9dce4d2c13420.exe"C:\Users\Admin\AppData\Local\Temp\2462e26144fa12fd2ca9dce4d2c13420.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Recovery\WindowsRE\backgroundTaskHost.exe"C:\Recovery\WindowsRE\backgroundTaskHost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Sidebar\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Sidebar\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2220
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1896
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 7 /tr "'C:\Users\Public\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3972
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Users\Public\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 8 /tr "'C:\Users\Public\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\odt\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4692
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\odt\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 8 /tr "'C:\odt\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3960
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:796
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2976
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\Users\Default User\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Default User\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4156
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\Program Files\Java\jdk1.8.0_66\db\lib\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:768
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Java\jdk1.8.0_66\db\lib\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 6 /tr "'C:\Program Files\Java\jdk1.8.0_66\db\lib\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3356
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\odt\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\odt\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\odt\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\odt\taskhostw.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\odt\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 7 /tr "'C:\odt\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1002KB
MD52462e26144fa12fd2ca9dce4d2c13420
SHA139151c10b343122006aaa172f1f1554a38137528
SHA2566fe3e7b8886862e6c2e9ea8684396da80e57ca2c1f85026e7edc0ae6cef80c35
SHA512d9dc3df7635afd99e49f2851443ab274063badbfb3382eab4fdf373c5a5aede7d3755f009000bc6dd3a6318bf158e8c4bd00999cb1a09cfbb5239b513ea858ca
-
Filesize
1002KB
MD52462e26144fa12fd2ca9dce4d2c13420
SHA139151c10b343122006aaa172f1f1554a38137528
SHA2566fe3e7b8886862e6c2e9ea8684396da80e57ca2c1f85026e7edc0ae6cef80c35
SHA512d9dc3df7635afd99e49f2851443ab274063badbfb3382eab4fdf373c5a5aede7d3755f009000bc6dd3a6318bf158e8c4bd00999cb1a09cfbb5239b513ea858ca
-
Filesize
1002KB
MD52462e26144fa12fd2ca9dce4d2c13420
SHA139151c10b343122006aaa172f1f1554a38137528
SHA2566fe3e7b8886862e6c2e9ea8684396da80e57ca2c1f85026e7edc0ae6cef80c35
SHA512d9dc3df7635afd99e49f2851443ab274063badbfb3382eab4fdf373c5a5aede7d3755f009000bc6dd3a6318bf158e8c4bd00999cb1a09cfbb5239b513ea858ca