Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 07:42
Static task
static1
Behavioral task
behavioral1
Sample
adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe
Resource
win10v2004-20241007-en
General
-
Target
adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe
-
Size
1.9MB
-
MD5
f93786885d2a064e5bfaa873d5adce3a
-
SHA1
2f5607b932aca74701dd9aa0a581d7e6971df23f
-
SHA256
adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca
-
SHA512
61d28dc832fd3ec100841323e1cdb3da166c0673bfbb20ab2ccff25d0e90b407b05fe8f59eb0ce93c0fdf130aa2b12e0cc7ce2158b4b2a22f51d7701550782c9
-
SSDEEP
49152:HN54VMGOhLmPkO4koPyVu5eAEfgPwNqsrui:v0vEf8u5eAmFZ
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 10 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2276 2064 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2444 2064 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2804 2064 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2744 2064 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2128 2064 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 2064 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2240 2064 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1096 2064 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1340 2064 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2088 2064 schtasks.exe -
Processes:
resource yara_rule behavioral1/memory/1556-1-0x0000000000CE0000-0x00000000011DA000-memory.dmp dcrat behavioral1/memory/1556-2-0x0000000000CE0000-0x00000000011DA000-memory.dmp dcrat behavioral1/memory/1556-29-0x0000000000CE0000-0x00000000011DA000-memory.dmp dcrat behavioral1/memory/1736-36-0x0000000000A50000-0x0000000000F4A000-memory.dmp dcrat behavioral1/memory/1736-37-0x0000000000A50000-0x0000000000F4A000-memory.dmp dcrat behavioral1/memory/1736-43-0x0000000000A50000-0x0000000000F4A000-memory.dmp dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exetaskhost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exetaskhost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhost.exe -
Executes dropped EXE 1 IoCs
Processes:
taskhost.exepid process 1736 taskhost.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exetaskhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine taskhost.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1844 cmd.exe 1844 cmd.exe -
Adds Run key to start application 2 TTPs 10 IoCs
Processes:
adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\System32\\TCPSVCS\\winlogon.exe\"" adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OSPPSVC = "\"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\OSPPSVC.exe\"" adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sppsvc = "\"C:\\Windows\\System32\\cmstp\\sppsvc.exe\"" adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Documents and Settings\\dllhost.exe\"" adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\SysWOW64\\migwiz\\csrss.exe\"" adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Program Files (x86)\\Reference Assemblies\\Microsoft\\dwm.exe\"" adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wininit = "\"C:\\Recovery\\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\\wininit.exe\"" adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\taskhost = "\"C:\\Windows\\System32\\wininit\\taskhost.exe\"" adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\System32\\replace\\spoolsv.exe\"" adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca = "\"C:\\Windows\\Globalization\\MCT\\MCT-US\\Link\\adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe\"" adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe -
Drops file in System32 directory 10 IoCs
Processes:
adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exedescription ioc process File created C:\Windows\SysWOW64\cmstp\0a1fd5f707cd16ea89afd3d6db52b2da58214a6c adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe File created C:\Windows\SysWOW64\migwiz\886983d96e3d3e31032c679b2d4ea91b6c05afef adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe File created C:\Windows\SysWOW64\wininit\taskhost.exe adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe File created C:\Windows\SysWOW64\wininit\b75386f1303e64d8139363b71e44ac16341adf4e adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe File created C:\Windows\SysWOW64\TCPSVCS\winlogon.exe adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe File created C:\Windows\SysWOW64\TCPSVCS\cc11b995f2a76da408ea6a601e682e64743153ad adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe File created C:\Windows\SysWOW64\cmstp\sppsvc.exe adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe File created C:\Windows\SysWOW64\migwiz\csrss.exe adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe File created C:\Windows\SysWOW64\replace\spoolsv.exe adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe File created C:\Windows\SysWOW64\replace\f3b6ecef712a24f33798f5d2fb3790c3d9b894c4 adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exetaskhost.exepid process 1556 adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe 1736 taskhost.exe -
Drops file in Program Files directory 2 IoCs
Processes:
adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exedescription ioc process File created C:\Program Files (x86)\Reference Assemblies\Microsoft\dwm.exe adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\6cb0b6c459d5d3455a3da700e713f2e2529862ff adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe -
Drops file in Windows directory 2 IoCs
Processes:
adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exedescription ioc process File created C:\Windows\Globalization\MCT\MCT-US\Link\adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe File created C:\Windows\Globalization\MCT\MCT-US\Link\57da0cdbbd21841835f7ca58736787658b008f7e adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.execmd.exew32tm.exetaskhost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w32tm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2804 schtasks.exe 2744 schtasks.exe 2128 schtasks.exe 2240 schtasks.exe 2088 schtasks.exe 2276 schtasks.exe 2628 schtasks.exe 1096 schtasks.exe 1340 schtasks.exe 2444 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exetaskhost.exepid process 1556 adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe 1556 adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe 1736 taskhost.exe 1736 taskhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exetaskhost.exedescription pid process Token: SeDebugPrivilege 1556 adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe Token: SeDebugPrivilege 1736 taskhost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.execmd.exew32tm.exedescription pid process target process PID 1556 wrote to memory of 1844 1556 adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe cmd.exe PID 1556 wrote to memory of 1844 1556 adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe cmd.exe PID 1556 wrote to memory of 1844 1556 adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe cmd.exe PID 1556 wrote to memory of 1844 1556 adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe cmd.exe PID 1844 wrote to memory of 784 1844 cmd.exe w32tm.exe PID 1844 wrote to memory of 784 1844 cmd.exe w32tm.exe PID 1844 wrote to memory of 784 1844 cmd.exe w32tm.exe PID 1844 wrote to memory of 784 1844 cmd.exe w32tm.exe PID 784 wrote to memory of 2660 784 w32tm.exe w32tm.exe PID 784 wrote to memory of 2660 784 w32tm.exe w32tm.exe PID 784 wrote to memory of 2660 784 w32tm.exe w32tm.exe PID 784 wrote to memory of 2660 784 w32tm.exe w32tm.exe PID 1844 wrote to memory of 1736 1844 cmd.exe taskhost.exe PID 1844 wrote to memory of 1736 1844 cmd.exe taskhost.exe PID 1844 wrote to memory of 1736 1844 cmd.exe taskhost.exe PID 1844 wrote to memory of 1736 1844 cmd.exe taskhost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe"C:\Users\Admin\AppData\Local\Temp\adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CXqqls3JSr.bat"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵PID:2660
-
-
-
C:\Windows\SysWOW64\wininit\taskhost.exe"C:\Windows\System32\wininit\taskhost.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\480d7142-91a3-11ef-b9f6-6e5a89f5a3c7\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\System32\cmstp\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2804
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Documents and Settings\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2744
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\SysWOW64\migwiz\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2128
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\System32\wininit\taskhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\TCPSVCS\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1096
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\replace\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1340
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca" /sc ONLOGON /tr "'C:\Windows\Globalization\MCT\MCT-US\Link\adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2088
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204B
MD542a5dbcc189c749c10cce2826b628163
SHA1c3084d37f178f28ac491330b6a668b0d16747370
SHA25697f4880f7f8736bc683dc6314573e4cfd3753f7d60a7cfae8876acdcd81f5b0a
SHA512c41c3e3802a097b1f820a3a28da22961c641326ea42d3ce0f8d17f8ff4a7da31e8816ba8787f85daaef25d13b5ce162d2f4998fe961dbfba07df65bb6f09ac4e
-
Filesize
1.9MB
MD5f93786885d2a064e5bfaa873d5adce3a
SHA12f5607b932aca74701dd9aa0a581d7e6971df23f
SHA256adebff4c705c3b2f33f51042bdba1094f29d33f24b456ddb1465be3f7f80b3ca
SHA51261d28dc832fd3ec100841323e1cdb3da166c0673bfbb20ab2ccff25d0e90b407b05fe8f59eb0ce93c0fdf130aa2b12e0cc7ce2158b4b2a22f51d7701550782c9