Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 02:31
Behavioral task
behavioral1
Sample
NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe
-
Size
783KB
-
MD5
b1d8052ed41a27fe08f3d2fff46b5490
-
SHA1
4b7e84c556fcf4ff2c5bdae48f73f084a7a8fe73
-
SHA256
62960dadc5119f2ad64919d0fa3c6d5b6bfc930f0bf171917dbb8cba03938431
-
SHA512
4b140ced04e60e998738d30a49666599e6720d39fbb3bd24c8414e0d632418c307f7447a7a3d808a5440eb5f992d8c7631e5c629462336a660888b15a22b0147
-
SSDEEP
12288:mqnOYxdAgpoNeF91rg5iFdr0yQ9gYx+EIpakCYJRU7Q9bWoFzqK:m+OQbpbgsFdAyQvzSqaq8q
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 8 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 264 4528 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 368 4528 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 4528 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3172 4528 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3816 4528 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2172 4528 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1208 4528 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4924 4528 schtasks.exe 91 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" SppExtComObj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" SppExtComObj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SppExtComObj.exe -
resource yara_rule behavioral2/memory/3032-0-0x0000000000B60000-0x0000000000C2A000-memory.dmp dcrat behavioral2/files/0x0006000000022ceb-37.dat dcrat behavioral2/files/0x0006000000022ce2-121.dat dcrat behavioral2/files/0x0006000000022ce2-120.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe -
Executes dropped EXE 1 IoCs
pid Process 3880 SppExtComObj.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\resources\\SearchApp.exe\"" NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SppExtComObj = "\"C:\\Windows\\System32\\NotificationControllerPS\\SppExtComObj.exe\"" NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SearchApp = "\"C:\\Windows\\SystemApps\\Microsoft.Windows.Search_cw5n1h2txyewy\\SearchApi.CppWinrt\\SearchApp.exe\"" NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MusNotification = "\"C:\\Windows\\System32\\SysFxUI\\MusNotification.exe\"" NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\backgroundTaskHost = "\"C:\\Windows\\System32\\IHDS\\backgroundTaskHost.exe\"" NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Program Files\\Java\\jre-1.8\\lib\\security\\smss.exe\"" NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Windows\\System32\\dnscmmc\\taskhostw.exe\"" NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\PerfLogs\\csrss.exe\"" NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SppExtComObj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SppExtComObj.exe -
Drops file in System32 directory 16 IoCs
description ioc Process File opened for modification C:\Windows\System32\IHDS\RCX3950.tmp NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File opened for modification C:\Windows\System32\SysFxUI\MusNotification.exe NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File opened for modification C:\Windows\System32\NotificationControllerPS\RCX32C5.tmp NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File opened for modification C:\Windows\System32\IHDS\backgroundTaskHost.exe NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File opened for modification C:\Windows\System32\dnscmmc\taskhostw.exe NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File created C:\Windows\System32\IHDS\eddb19405b7ce1152b3e19997f2b467f0b72b3d3 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File created C:\Windows\System32\IHDS\backgroundTaskHost.exe NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File created C:\Windows\System32\dnscmmc\taskhostw.exe NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File opened for modification C:\Windows\System32\dnscmmc\RCX3D69.tmp NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File created C:\Windows\System32\SysFxUI\MusNotification.exe NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File created C:\Windows\System32\NotificationControllerPS\e1ef82546f0b02b7e974f28047f3788b1128cce1 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File created C:\Windows\System32\SysFxUI\aa97147c4c782d4a77c6b7822ef5383b917e6cfb NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File created C:\Windows\System32\dnscmmc\ea9f0e6c9e2dcd4dfacdaf29ba21541fb815a988 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File opened for modification C:\Windows\System32\NotificationControllerPS\SppExtComObj.exe NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File opened for modification C:\Windows\System32\SysFxUI\RCX36EE.tmp NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File created C:\Windows\System32\NotificationControllerPS\SppExtComObj.exe NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Java\jre-1.8\lib\security\smss.exe NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File created C:\Program Files\Java\jre-1.8\lib\security\69ddcba757bf72f7d36c464c71f42baab150b2b9 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\RCX3B55.tmp NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\smss.exe NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.CppWinrt\SearchApp.exe NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.CppWinrt\38384e6a620884a6b69bcc56f80d556f9200171c NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\resources\RCX3082.tmp NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.CppWinrt\RCX34D9.tmp NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.CppWinrt\SearchApp.exe NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\resources\SearchApp.exe NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File opened for modification C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\resources\SearchApp.exe NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\resources\38384e6a620884a6b69bcc56f80d556f9200171c NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3172 schtasks.exe 3816 schtasks.exe 2172 schtasks.exe 1208 schtasks.exe 4924 schtasks.exe 264 schtasks.exe 368 schtasks.exe 2612 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 3880 SppExtComObj.exe 3880 SppExtComObj.exe 3880 SppExtComObj.exe 3880 SppExtComObj.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe Token: SeDebugPrivilege 3880 SppExtComObj.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3032 wrote to memory of 5076 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 100 PID 3032 wrote to memory of 5076 3032 NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe 100 PID 5076 wrote to memory of 4852 5076 cmd.exe 102 PID 5076 wrote to memory of 4852 5076 cmd.exe 102 PID 5076 wrote to memory of 3880 5076 cmd.exe 106 PID 5076 wrote to memory of 3880 5076 cmd.exe 106 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SppExtComObj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" SppExtComObj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" SppExtComObj.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.b1d8052ed41a27fe08f3d2fff46b5490.exe"1⤵
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3032 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RBw34MHLBy.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:4852
-
-
C:\Windows\System32\NotificationControllerPS\SppExtComObj.exe"C:\Windows\System32\NotificationControllerPS\SppExtComObj.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3880
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\resources\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:264
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\System32\NotificationControllerPS\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:368
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApi.CppWinrt\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Windows\System32\SysFxUI\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\System32\IHDS\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files\Java\jre-1.8\lib\security\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\System32\dnscmmc\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\PerfLogs\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4924
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225B
MD54b283d1d3cf6a76a12e45c4a61f8acd1
SHA164df859a6a43f585c25eef6c05ec27fd2b978fa6
SHA2562322bf61242976acaf36f7d10629fa8c90800bbab88d290402ca6a4d3ddaf284
SHA512272801aca0b9227e65fb10c798fe923c74812d4d1909c07359689f6bd4cde51a22daf4e8d21de407578f0b83799aa6ddcde3c09bd770de4d5db6acc2bf9c8fc0
-
Filesize
783KB
MD5b1d8052ed41a27fe08f3d2fff46b5490
SHA14b7e84c556fcf4ff2c5bdae48f73f084a7a8fe73
SHA25662960dadc5119f2ad64919d0fa3c6d5b6bfc930f0bf171917dbb8cba03938431
SHA5124b140ced04e60e998738d30a49666599e6720d39fbb3bd24c8414e0d632418c307f7447a7a3d808a5440eb5f992d8c7631e5c629462336a660888b15a22b0147
-
Filesize
783KB
MD5b1d8052ed41a27fe08f3d2fff46b5490
SHA14b7e84c556fcf4ff2c5bdae48f73f084a7a8fe73
SHA25662960dadc5119f2ad64919d0fa3c6d5b6bfc930f0bf171917dbb8cba03938431
SHA5124b140ced04e60e998738d30a49666599e6720d39fbb3bd24c8414e0d632418c307f7447a7a3d808a5440eb5f992d8c7631e5c629462336a660888b15a22b0147
-
Filesize
783KB
MD5b1d8052ed41a27fe08f3d2fff46b5490
SHA14b7e84c556fcf4ff2c5bdae48f73f084a7a8fe73
SHA25662960dadc5119f2ad64919d0fa3c6d5b6bfc930f0bf171917dbb8cba03938431
SHA5124b140ced04e60e998738d30a49666599e6720d39fbb3bd24c8414e0d632418c307f7447a7a3d808a5440eb5f992d8c7631e5c629462336a660888b15a22b0147