Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 00:00
Behavioral task
behavioral1
Sample
771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe
Resource
win10v2004-20241007-en
General
-
Target
771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe
-
Size
952KB
-
MD5
066ac67ff4803f8053decd2f83d5834e
-
SHA1
4f9a371bbbb0d601d36eb150134397c8e2fb4b06
-
SHA256
771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3
-
SHA512
9ffaf8455c3b36c6c06bd1fd7dd63544376ee5699769b14041186152a428a213be6174c55531cdd46896038d20297e27ccb90a167c1d1537bb73ec4bf516c305
-
SSDEEP
24576:W+O7F9smBDJwWmIezBLwsHuWbxR4AK5ZJXX:x8/KfRTK
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Adobe\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\vss_ps\\winlogon.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Adobe\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\vss_ps\\winlogon.exe\", \"C:\\Windows\\System32\\PeerDistHttpTrans\\dwm.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Adobe\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\vss_ps\\winlogon.exe\", \"C:\\Windows\\System32\\PeerDistHttpTrans\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\MusNotification.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Adobe\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\vss_ps\\winlogon.exe\", \"C:\\Windows\\System32\\PeerDistHttpTrans\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\MusNotification.exe\", \"C:\\Documents and Settings\\fontdrvhost.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Adobe\\RuntimeBroker.exe\", \"C:\\Windows\\System32\\vss_ps\\winlogon.exe\", \"C:\\Windows\\System32\\PeerDistHttpTrans\\dwm.exe\", \"C:\\Recovery\\WindowsRE\\MusNotification.exe\", \"C:\\Documents and Settings\\fontdrvhost.exe\", \"C:\\Windows\\System32\\pcwum\\dllhost.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\All Users\\Adobe\\RuntimeBroker.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe -
Process spawned unexpected child process 6 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4936 468 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4000 468 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 396 468 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4204 468 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2992 468 schtasks.exe 83 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4172 468 schtasks.exe 83 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe -
resource yara_rule behavioral2/memory/1244-1-0x0000000000430000-0x0000000000524000-memory.dmp dcrat behavioral2/files/0x0007000000023c83-20.dat dcrat behavioral2/files/0x000a000000023c8b-49.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe -
Executes dropped EXE 1 IoCs
pid Process 2296 RuntimeBroker.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\System32\\vss_ps\\winlogon.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\PeerDistHttpTrans\\dwm.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Documents and Settings\\fontdrvhost.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Documents and Settings\\fontdrvhost.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\pcwum\\dllhost.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Users\\All Users\\Adobe\\RuntimeBroker.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Users\\All Users\\Adobe\\RuntimeBroker.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\System32\\vss_ps\\winlogon.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\PeerDistHttpTrans\\dwm.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MusNotification = "\"C:\\Recovery\\WindowsRE\\MusNotification.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MusNotification = "\"C:\\Recovery\\WindowsRE\\MusNotification.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\pcwum\\dllhost.exe\"" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RuntimeBroker.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File created C:\Windows\System32\pcwum\5940a34987c99120d96dace90a3f93f329dcad63 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File opened for modification C:\Windows\System32\pcwum\RCXB16B.tmp 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File opened for modification C:\Windows\System32\pcwum\dllhost.exe 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File created C:\Windows\System32\vss_ps\winlogon.exe 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File opened for modification C:\Windows\System32\vss_ps\winlogon.exe 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File opened for modification C:\Windows\System32\PeerDistHttpTrans\RCXAB3B.tmp 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File opened for modification C:\Windows\System32\PeerDistHttpTrans\dwm.exe 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File opened for modification C:\Windows\System32\pcwum\RCXB16A.tmp 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File created C:\Windows\System32\vss_ps\cc11b995f2a76da408ea6a601e682e64743153ad 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File opened for modification C:\Windows\System32\vss_ps\RCXA8B7.tmp 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File created C:\Windows\System32\pcwum\dllhost.exe 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File created C:\Windows\System32\PeerDistHttpTrans\6cb0b6c459d5d3455a3da700e713f2e2529862ff 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File opened for modification C:\Windows\System32\vss_ps\RCXA926.tmp 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File opened for modification C:\Windows\System32\PeerDistHttpTrans\RCXAB2A.tmp 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe File created C:\Windows\System32\PeerDistHttpTrans\dwm.exe 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\ServiceState\EventLog\Data\dllhost.exe 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4172 schtasks.exe 4936 schtasks.exe 4000 schtasks.exe 396 schtasks.exe 4204 schtasks.exe 2992 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1244 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1244 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Token: SeDebugPrivilege 2296 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1244 wrote to memory of 3084 1244 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe 91 PID 1244 wrote to memory of 3084 1244 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe 91 PID 3084 wrote to memory of 2680 3084 cmd.exe 93 PID 3084 wrote to memory of 2680 3084 cmd.exe 93 PID 3084 wrote to memory of 2296 3084 cmd.exe 100 PID 3084 wrote to memory of 2296 3084 cmd.exe 100 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" RuntimeBroker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" RuntimeBroker.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe"C:\Users\Admin\AppData\Local\Temp\771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1244 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\etHSLN8dTB.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2680
-
-
C:\Users\All Users\Adobe\RuntimeBroker.exe"C:\Users\All Users\Adobe\RuntimeBroker.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2296
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\All Users\Adobe\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\vss_ps\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\PeerDistHttpTrans\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:396
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MusNotification" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\MusNotification.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4204
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Documents and Settings\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\pcwum\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4172
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206B
MD5ecc523ceabd5f1a1c1a41bd99390fa6d
SHA1178cec830e86c04e0a5d7f467a264a21e811db37
SHA256203d9a7abdca8c86001fb4961ef9db27ad1a7e35289952f2b298103fb2ae6c33
SHA512138c66fae203415c80b6a082024b64e9862a738348aa093f7b7fb64f12d359f670ccbb8cc198508f88d3e15c630985c800ebdd966dce677a1f85bb31871e23a1
-
Filesize
952KB
MD5066ac67ff4803f8053decd2f83d5834e
SHA14f9a371bbbb0d601d36eb150134397c8e2fb4b06
SHA256771f3bc23da9c40adfb3ba5869ecde3890681af6cb8ff9a0c9104b04be3307b3
SHA5129ffaf8455c3b36c6c06bd1fd7dd63544376ee5699769b14041186152a428a213be6174c55531cdd46896038d20297e27ccb90a167c1d1537bb73ec4bf516c305
-
Filesize
952KB
MD53fb8b34216deb5eb692e0db487f57b1e
SHA1047a9ec59ed3bf61be3c76e1305fe2cb5b239d35
SHA25652e0947a7e23f4567d909e99d5a58416bf81aae4a973d1a2be6039af00cd1896
SHA512b8607dec67ab3bc7a5ad0ae9c4c4a8749ef9ada9caf76c7732b801d7ca25bf07b388f1cf5668fc2c5e4925519e95613a06f0cfee75eb61559ae45ad1b20078eb