Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 16:46
Static task
static1
Behavioral task
behavioral1
Sample
51ED2A0701D313F3761169D91FB69848.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
51ED2A0701D313F3761169D91FB69848.exe
Resource
win10v2004-20241007-en
General
-
Target
51ED2A0701D313F3761169D91FB69848.exe
-
Size
2.4MB
-
MD5
51ed2a0701d313f3761169d91fb69848
-
SHA1
ed39a76db78d1d3c9c3a3a20d5dcf8da19e51ba3
-
SHA256
1b304c8a2ae4546bd7958c7f22becaf6b682a5c88b7a01945a952de991b0ef0b
-
SHA512
324bb255f7b5edef459ca8c5ec88509cd86f0fc060c546c9484294db5c97bcd56d0483b0074d63763f85fea0807ed2b3e10fb7749c797e0ea3d511382dd0be85
-
SSDEEP
49152:3XfX30/e4wkPaOoMoa+QPPHPahen4S2V526is7K9gn6weB1din4OEU6zMa:nf0/e47aOoMcQP6M4S+4676P3wn4dz
Malware Config
Signatures
-
DcRat 21 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exe51ED2A0701D313F3761169D91FB69848.execomSession.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription ioc pid Process 1244 schtasks.exe 624 schtasks.exe 808 schtasks.exe 1256 schtasks.exe 2036 schtasks.exe 1092 schtasks.exe 3040 schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51ED2A0701D313F3761169D91FB69848.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\6203df4a6bafc7 comSession.exe 3016 schtasks.exe 672 schtasks.exe 1440 schtasks.exe 2536 schtasks.exe 3024 schtasks.exe 2180 schtasks.exe 2328 schtasks.exe 2148 schtasks.exe 2664 schtasks.exe File created C:\Program Files\Internet Explorer\SIGNUP\0a1fd5f707cd16 comSession.exe 2496 schtasks.exe 1088 schtasks.exe -
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 672 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 624 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 808 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3016 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1244 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1256 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2036 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1092 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1440 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2536 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3040 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3024 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2180 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2328 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2148 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2496 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2664 2556 schtasks.exe 37 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1088 2556 schtasks.exe 37 -
Processes:
resource yara_rule behavioral1/files/0x00070000000194da-3.dat dcrat behavioral1/files/0x00060000000195f9-22.dat dcrat behavioral1/memory/2708-26-0x00000000009A0000-0x0000000000C02000-memory.dmp dcrat behavioral1/memory/2528-56-0x00000000012D0000-0x0000000001532000-memory.dmp dcrat -
Disables Task Manager via registry modification
-
Executes dropped EXE 4 IoCs
Processes:
RayCheats.execomSession.execomSession.execomSession.exepid Process 1976 RayCheats.exe 2708 comSession.exe 2772 comSession.exe 2528 comSession.exe -
Loads dropped DLL 3 IoCs
Processes:
51ED2A0701D313F3761169D91FB69848.execmd.exepid Process 2032 51ED2A0701D313F3761169D91FB69848.exe 2212 cmd.exe 2212 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Drops file in Program Files directory 9 IoCs
Processes:
comSession.execomSession.exedescription ioc Process File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\lsass.exe comSession.exe File created C:\Program Files\7-Zip\spoolsv.exe comSession.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\lsass.exe comSession.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\6203df4a6bafc7 comSession.exe File created C:\Program Files\Internet Explorer\SIGNUP\sppsvc.exe comSession.exe File created C:\Program Files\Internet Explorer\SIGNUP\0a1fd5f707cd16 comSession.exe File created C:\Program Files\7-Zip\f3b6ecef712a24 comSession.exe File created C:\Program Files\Uninstall Information\comSession.exe comSession.exe File created C:\Program Files\Uninstall Information\1afbe158ad46e6 comSession.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
reg.exe51ED2A0701D313F3761169D91FB69848.exeRayCheats.exeWScript.exeWScript.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51ED2A0701D313F3761169D91FB69848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RayCheats.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 1244 schtasks.exe 1256 schtasks.exe 2180 schtasks.exe 2148 schtasks.exe 2664 schtasks.exe 1088 schtasks.exe 624 schtasks.exe 808 schtasks.exe 3040 schtasks.exe 2496 schtasks.exe 2036 schtasks.exe 1092 schtasks.exe 2328 schtasks.exe 2536 schtasks.exe 3024 schtasks.exe 1440 schtasks.exe 672 schtasks.exe 3016 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
comSession.execomSession.execomSession.exepid Process 2708 comSession.exe 2708 comSession.exe 2708 comSession.exe 2772 comSession.exe 2772 comSession.exe 2772 comSession.exe 2528 comSession.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
comSession.execomSession.execomSession.exedescription pid Process Token: SeDebugPrivilege 2708 comSession.exe Token: SeDebugPrivilege 2772 comSession.exe Token: SeDebugPrivilege 2528 comSession.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
51ED2A0701D313F3761169D91FB69848.exeRayCheats.exeWScript.execmd.execomSession.execomSession.execmd.exedescription pid Process procid_target PID 2032 wrote to memory of 1976 2032 51ED2A0701D313F3761169D91FB69848.exe 31 PID 2032 wrote to memory of 1976 2032 51ED2A0701D313F3761169D91FB69848.exe 31 PID 2032 wrote to memory of 1976 2032 51ED2A0701D313F3761169D91FB69848.exe 31 PID 2032 wrote to memory of 1976 2032 51ED2A0701D313F3761169D91FB69848.exe 31 PID 1976 wrote to memory of 2892 1976 RayCheats.exe 32 PID 1976 wrote to memory of 2892 1976 RayCheats.exe 32 PID 1976 wrote to memory of 2892 1976 RayCheats.exe 32 PID 1976 wrote to memory of 2892 1976 RayCheats.exe 32 PID 1976 wrote to memory of 2928 1976 RayCheats.exe 33 PID 1976 wrote to memory of 2928 1976 RayCheats.exe 33 PID 1976 wrote to memory of 2928 1976 RayCheats.exe 33 PID 1976 wrote to memory of 2928 1976 RayCheats.exe 33 PID 2892 wrote to memory of 2212 2892 WScript.exe 34 PID 2892 wrote to memory of 2212 2892 WScript.exe 34 PID 2892 wrote to memory of 2212 2892 WScript.exe 34 PID 2892 wrote to memory of 2212 2892 WScript.exe 34 PID 2212 wrote to memory of 2708 2212 cmd.exe 36 PID 2212 wrote to memory of 2708 2212 cmd.exe 36 PID 2212 wrote to memory of 2708 2212 cmd.exe 36 PID 2212 wrote to memory of 2708 2212 cmd.exe 36 PID 2708 wrote to memory of 2772 2708 comSession.exe 44 PID 2708 wrote to memory of 2772 2708 comSession.exe 44 PID 2708 wrote to memory of 2772 2708 comSession.exe 44 PID 2212 wrote to memory of 1708 2212 cmd.exe 45 PID 2212 wrote to memory of 1708 2212 cmd.exe 45 PID 2212 wrote to memory of 1708 2212 cmd.exe 45 PID 2212 wrote to memory of 1708 2212 cmd.exe 45 PID 2772 wrote to memory of 604 2772 comSession.exe 58 PID 2772 wrote to memory of 604 2772 comSession.exe 58 PID 2772 wrote to memory of 604 2772 comSession.exe 58 PID 604 wrote to memory of 1596 604 cmd.exe 60 PID 604 wrote to memory of 1596 604 cmd.exe 60 PID 604 wrote to memory of 1596 604 cmd.exe 60 PID 604 wrote to memory of 2528 604 cmd.exe 61 PID 604 wrote to memory of 2528 604 cmd.exe 61 PID 604 wrote to memory of 2528 604 cmd.exe 61 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\51ED2A0701D313F3761169D91FB69848.exe"C:\Users\Admin\AppData\Local\Temp\51ED2A0701D313F3761169D91FB69848.exe"1⤵
- DcRat
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\RayCheats.exe"C:\Users\Admin\AppData\Local\Temp\RayCheats.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Nursultan\CXMe2.vbe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Nursultan\zvsDOSOzYWKFo4ZM.bat" "4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Roaming\Nursultan\comSession.exe"C:\Users\Admin\AppData\Roaming\Nursultan\comSession.exe"5⤵
- DcRat
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Roaming\Nursultan\comSession.exe"C:\Users\Admin\AppData\Roaming\Nursultan\comSession.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hXXWk5pvz3.bat"7⤵
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:1596
-
-
C:\Program Files\Uninstall Information\comSession.exe"C:\Program Files\Uninstall Information\comSession.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1708
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Nursultan\file.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:2928
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\lsass.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Program Files\Internet Explorer\SIGNUP\sppsvc.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\SIGNUP\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1244
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Program Files\Internet Explorer\SIGNUP\sppsvc.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1256
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\wininit.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2036
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\wininit.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1440
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 11 /tr "'C:\Program Files\7-Zip\spoolsv.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2536
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\7-Zip\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3040
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Program Files\7-Zip\spoolsv.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3024
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Videos\services.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Users\Default\Videos\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Videos\services.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "comSessionc" /sc MINUTE /mo 6 /tr "'C:\Program Files\Uninstall Information\comSession.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "comSession" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\comSession.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "comSessionc" /sc MINUTE /mo 10 /tr "'C:\Program Files\Uninstall Information\comSession.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD5ab9414801ac561309a25943d44835fdd
SHA122d78f49e17eed5b5d29665359cef1ca46fcfe0f
SHA2566125a497dff727994322971c7db5df582a989851efe7202f2640576ee17d1262
SHA51250034ce6cf59954ea01b15d1a1322fe0b0f6a7eae4f5a9a494c2bd2121aa279bfc533cae5ac25436be60c58a4fba66952ccefb6a8c74863270ec47f345e9b204
-
Filesize
209B
MD5484bfd68922e5e27228c2fa473677110
SHA1eb2495adad200e316f7d5961b668a2af32958fce
SHA2567a11a2afd7914cc6d77553b3d44af9a3bbd65551af2a551138fb27ecb066d442
SHA5120b4f2acc2d5e4cb7cb3e5f105e29f9ef1640a76e22039b7b6337b1d0e7aacde29f107ae3c5e08b8b1c6d419cb40877d7d7e66721eb7320096a24162eecd9ccf0
-
Filesize
34B
MD5677cc4360477c72cb0ce00406a949c61
SHA1b679e8c3427f6c5fc47c8ac46cd0e56c9424de05
SHA256f1cccb5ae4aa51d293bd3c7d2a1a04cb7847d22c5db8e05ac64e9a6d7455aa0b
SHA5127cfe2cc92f9e659f0a15a295624d611b3363bd01eb5bcf9bc7681ea9b70b0564d192d570d294657c8dc2c93497fa3b4526c975a9bf35d69617c31d9936573c6a
-
Filesize
148B
MD5deb8d9eeb4557c39315338a00cd83916
SHA18ecc2410818d611e48e1ec81e7ab6ce88af420bf
SHA2560e9a479bd000929602b921f116255053d01c3908837dcaae884765f48bb243b6
SHA51288172330ba223eefad09e759dc769a7d976a0c1e00b28b30cd4b7cf2f8cb75d5589119fa1fcddf1e603a3ebd41bf2f65e0276464dbd1c59dc70ef4e86f0b10b8
-
Filesize
2.7MB
MD5db35ed4e6955685c244b4ac954115fff
SHA1751834b825b6e17b489f33e1e3b17c7c3c1295ab
SHA256c3babdee670d6cf922cb746a997f5ee112a11a141584c0eb703d192fc1fcee64
SHA5129facb2880120ccb677cf96e4b911685f0c18317e6a4e9d7b34b6363fa6e32e864f6b893f3023fb743481e1dcb39fcd83602735c569342ace49281044c52f2d5f
-
Filesize
2.4MB
MD51b6bf62c6d2fe41fcb3d8dd8372abba6
SHA1ea6c66691c5dd2c014f47145d44525d39e08aea8
SHA25684c35170f401c1b809aaa7888f79fe11860798fe3a82328383840e1d133f9d2e
SHA512fbf727e76880f1ea6132c8491bfc2d218d48ad12c6672c64bd9928ab8f46bea16454d696bceb515f0b22195c6456ee66305cda41ffdbd6fa66f40cc520009c2b