Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
10-11-2023 14:27
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.893bb5ccc58e1d3ab7d2e28a5ecbf58195d10bc352f800b65d905c9655158439.msi
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.893bb5ccc58e1d3ab7d2e28a5ecbf58195d10bc352f800b65d905c9655158439.msi
Resource
win10v2004-20231023-en
General
-
Target
NEAS.893bb5ccc58e1d3ab7d2e28a5ecbf58195d10bc352f800b65d905c9655158439.msi
-
Size
8.5MB
-
MD5
be421d1cfaba686bcafee896c24b4b45
-
SHA1
f89fe47d0ae4d708876e3e80c250eef6582f148b
-
SHA256
893bb5ccc58e1d3ab7d2e28a5ecbf58195d10bc352f800b65d905c9655158439
-
SHA512
74514c6a8920b9cb645d13f82228a6124487715ddc736661e1e86b1b141292fae6278f84dac7c81c3139823b8b505f1d09d31eafb0896c5ca7525f49bf9b65f7
-
SSDEEP
196608:PeS5hV9/S6WXbfXlTrn7HZ5AQX3AveLukj1w9+MeLGW+x:PdhVs6WXjX9HZ5AQX32WDa8
Malware Config
Extracted
darkgate
ADS5
http://siliconerumble.com
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
443
-
check_disk
false
-
check_ram
true
-
check_xeon
true
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
nZWkslxXPxaMte
-
internal_mutex
txtMut
-
minimum_disk
32
-
minimum_ram
6005
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
ADS5
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2376 windbg.exe 2872 Autoit3.exe -
Loads dropped DLL 7 IoCs
pid Process 1556 MsiExec.exe 1556 MsiExec.exe 1556 MsiExec.exe 1556 MsiExec.exe 1556 MsiExec.exe 2376 windbg.exe 2376 windbg.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1056 ICACLS.EXE 2916 ICACLS.EXE -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\f76ea21.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIECBF.tmp msiexec.exe File opened for modification C:\Windows\Installer\f76ea21.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\f76ea20.msi msiexec.exe File opened for modification C:\Windows\Installer\f76ea20.msi msiexec.exe File opened for modification C:\Windows\Logs\DPX\setupact.log EXPAND.EXE File opened for modification C:\Windows\Logs\DPX\setuperr.log EXPAND.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2880 msiexec.exe 2880 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeShutdownPrivilege 2944 msiexec.exe Token: SeIncreaseQuotaPrivilege 2944 msiexec.exe Token: SeRestorePrivilege 2880 msiexec.exe Token: SeTakeOwnershipPrivilege 2880 msiexec.exe Token: SeSecurityPrivilege 2880 msiexec.exe Token: SeCreateTokenPrivilege 2944 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2944 msiexec.exe Token: SeLockMemoryPrivilege 2944 msiexec.exe Token: SeIncreaseQuotaPrivilege 2944 msiexec.exe Token: SeMachineAccountPrivilege 2944 msiexec.exe Token: SeTcbPrivilege 2944 msiexec.exe Token: SeSecurityPrivilege 2944 msiexec.exe Token: SeTakeOwnershipPrivilege 2944 msiexec.exe Token: SeLoadDriverPrivilege 2944 msiexec.exe Token: SeSystemProfilePrivilege 2944 msiexec.exe Token: SeSystemtimePrivilege 2944 msiexec.exe Token: SeProfSingleProcessPrivilege 2944 msiexec.exe Token: SeIncBasePriorityPrivilege 2944 msiexec.exe Token: SeCreatePagefilePrivilege 2944 msiexec.exe Token: SeCreatePermanentPrivilege 2944 msiexec.exe Token: SeBackupPrivilege 2944 msiexec.exe Token: SeRestorePrivilege 2944 msiexec.exe Token: SeShutdownPrivilege 2944 msiexec.exe Token: SeDebugPrivilege 2944 msiexec.exe Token: SeAuditPrivilege 2944 msiexec.exe Token: SeSystemEnvironmentPrivilege 2944 msiexec.exe Token: SeChangeNotifyPrivilege 2944 msiexec.exe Token: SeRemoteShutdownPrivilege 2944 msiexec.exe Token: SeUndockPrivilege 2944 msiexec.exe Token: SeSyncAgentPrivilege 2944 msiexec.exe Token: SeEnableDelegationPrivilege 2944 msiexec.exe Token: SeManageVolumePrivilege 2944 msiexec.exe Token: SeImpersonatePrivilege 2944 msiexec.exe Token: SeCreateGlobalPrivilege 2944 msiexec.exe Token: SeBackupPrivilege 2244 vssvc.exe Token: SeRestorePrivilege 2244 vssvc.exe Token: SeAuditPrivilege 2244 vssvc.exe Token: SeBackupPrivilege 2880 msiexec.exe Token: SeRestorePrivilege 2880 msiexec.exe Token: SeRestorePrivilege 2608 DrvInst.exe Token: SeRestorePrivilege 2608 DrvInst.exe Token: SeRestorePrivilege 2608 DrvInst.exe Token: SeRestorePrivilege 2608 DrvInst.exe Token: SeRestorePrivilege 2608 DrvInst.exe Token: SeRestorePrivilege 2608 DrvInst.exe Token: SeRestorePrivilege 2608 DrvInst.exe Token: SeLoadDriverPrivilege 2608 DrvInst.exe Token: SeLoadDriverPrivilege 2608 DrvInst.exe Token: SeLoadDriverPrivilege 2608 DrvInst.exe Token: SeRestorePrivilege 2880 msiexec.exe Token: SeTakeOwnershipPrivilege 2880 msiexec.exe Token: SeRestorePrivilege 2880 msiexec.exe Token: SeTakeOwnershipPrivilege 2880 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2944 msiexec.exe 2944 msiexec.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2880 wrote to memory of 1556 2880 msiexec.exe 34 PID 2880 wrote to memory of 1556 2880 msiexec.exe 34 PID 2880 wrote to memory of 1556 2880 msiexec.exe 34 PID 2880 wrote to memory of 1556 2880 msiexec.exe 34 PID 2880 wrote to memory of 1556 2880 msiexec.exe 34 PID 2880 wrote to memory of 1556 2880 msiexec.exe 34 PID 2880 wrote to memory of 1556 2880 msiexec.exe 34 PID 1556 wrote to memory of 1056 1556 MsiExec.exe 35 PID 1556 wrote to memory of 1056 1556 MsiExec.exe 35 PID 1556 wrote to memory of 1056 1556 MsiExec.exe 35 PID 1556 wrote to memory of 1056 1556 MsiExec.exe 35 PID 1556 wrote to memory of 1564 1556 MsiExec.exe 37 PID 1556 wrote to memory of 1564 1556 MsiExec.exe 37 PID 1556 wrote to memory of 1564 1556 MsiExec.exe 37 PID 1556 wrote to memory of 1564 1556 MsiExec.exe 37 PID 1556 wrote to memory of 2376 1556 MsiExec.exe 39 PID 1556 wrote to memory of 2376 1556 MsiExec.exe 39 PID 1556 wrote to memory of 2376 1556 MsiExec.exe 39 PID 1556 wrote to memory of 2376 1556 MsiExec.exe 39 PID 1556 wrote to memory of 2376 1556 MsiExec.exe 39 PID 1556 wrote to memory of 2376 1556 MsiExec.exe 39 PID 1556 wrote to memory of 2376 1556 MsiExec.exe 39 PID 2376 wrote to memory of 2872 2376 windbg.exe 40 PID 2376 wrote to memory of 2872 2376 windbg.exe 40 PID 2376 wrote to memory of 2872 2376 windbg.exe 40 PID 2376 wrote to memory of 2872 2376 windbg.exe 40 PID 1556 wrote to memory of 1784 1556 MsiExec.exe 41 PID 1556 wrote to memory of 1784 1556 MsiExec.exe 41 PID 1556 wrote to memory of 1784 1556 MsiExec.exe 41 PID 1556 wrote to memory of 1784 1556 MsiExec.exe 41 PID 1556 wrote to memory of 2916 1556 MsiExec.exe 43 PID 1556 wrote to memory of 2916 1556 MsiExec.exe 43 PID 1556 wrote to memory of 2916 1556 MsiExec.exe 43 PID 1556 wrote to memory of 2916 1556 MsiExec.exe 43 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\NEAS.893bb5ccc58e1d3ab7d2e28a5ecbf58195d10bc352f800b65d905c9655158439.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2944
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DCC0D934036ED02729154779F456CFA52⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\." /SETINTEGRITYLEVEL (CI)(OI)HIGH3⤵
- Modifies file permissions
PID:1056
-
-
C:\Windows\SysWOW64\EXPAND.EXE"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files3⤵
- Drops file in Windows directory
PID:1564
-
-
C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\windbg.exe"C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files\windbg.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2376 -
\??\c:\tmpa\Autoit3.exec:\tmpa\Autoit3.exe c:\tmpa\script.au34⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\files"3⤵PID:1784
-
-
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-68aef085-9bd3-4ec3-9811-dcc0d7cc9d19\." /SETINTEGRITYLEVEL (CI)(OI)LOW3⤵
- Modifies file permissions
PID:2916
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005C4" "00000000000004D4"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD59ef2066882c6378a97975c18f89b482b
SHA192cb2eefea833c60d6e9909769baae4f7c236195
SHA25645d192bad5d434e424ee9198592a7151cb98dc4554cb7c9906c86f191f6b755a
SHA512cd5f1deea259ff6289e4c60f4811e649da01f20962150cb22ef23ad7fdcaa32ffda7f6ca592db700c8682568c76a9267acd095090ed558ee73fb47044e549a9b
-
Filesize
1.1MB
MD52ccc17c1a5bb5e656e7f3bb09ff0beff
SHA105866cf7dd5fa99ea852b01c2791b30e7741ea19
SHA256411b6ce9e97a4d828ab43dcf896f8ea09b5e9dc02874909f53ca1e0f10caeed2
SHA51246b7362a2df870018707d89a7340ac0c07a2a357c504dbd944699c0231b4f984661b9f112b9d4869e55cf208ed5968f3ec5b5b35a956329679fb6e48ada7c4c5
-
Filesize
1.8MB
MD5dee56d4f89c71ea6c4f1e75b82f2e9c9
SHA1293ce531cddbf4034782d5dfed1e35c807d75c52
SHA256a8f1ffb62d49d35a0f838f358614333e3d5d68ce5409fdfefcd1aa218d4639cf
SHA512e8c38dc1d7a49d9cb919eae5294cc64379a933cdbd5427ed38c5f915271655f9bd6363e131f9d8a74ffdda23c7b155cc5200ddf999339ea611b98e74355faa0c
-
Filesize
1.8MB
MD5173a98c6c7a166db7c3caa3a06fec06c
SHA13c562051f42353e72ba87b6f54744f6d0107df86
SHA256212a80b3f8e68d00dbd8fc55fc8c4b30ee996348262d5d37e8b3f431a4b2fdad
SHA5129dcd341937eff32762767d3538499d211f5a50fddb4e83d5d1afbeb87a5420c1fb9952ef2ecc744c460b7d53baa2bffbe99087a9f794d25ba78d1af61ea8b54d
-
Filesize
1.6MB
MD594b4895b7b8a60481393b7b8c22ad742
SHA1902796c4aee78ab74e7ba5004625d797d83a8787
SHA256f449409c8747d8e73ac7f8539c6e26d526ef51d267fed40eadce138389db5973
SHA512d1ed6f5a1920eca041a683d71ac562058bc513877e3ae8be18888797d0713e25964c610428f9474d9b539097441002275e1f0023a565bd205cd4153ac282b61e
-
Filesize
92KB
MD5b3996eff179da39465dde1c61370ec05
SHA10d76bf1627a011a14de0b6fd9bfe9813d5c9b806
SHA256fe4110e1573e0ad989a64ed92e40cf81c80e286d7f474acba89d8a9485a2e2e4
SHA5121b938b4b3e08f32c7125e1f33e40ff2c943f792de385ed0e56edc4717b5935c425587ff25191c283581eebabf176b6a2e7af3405d3ffab586201177aae76e5b2
-
Filesize
1.8MB
MD5cee302941b279784ec4aaee981748e47
SHA110a74d4a6a63930751abe514d896f35d6bcb5ae8
SHA256176e09e654a36a174c52ad6ae5aa5b1e10ce276fc0fffbf04180a8fbbc1ceb32
SHA512f55ce7f92e8b778d4028fc3f6162967bd014d885d4bd7e80759fa4e6d482794ca8d6883fc26798bf90ae8ec03c7bda893f56c0538c2734601809797f8818dfc4
-
Filesize
1.9MB
MD566e9a858ad4a1dc41b24149195477d46
SHA19c091a74be0a617f5fc260a7e44b754d73d86ef8
SHA2561fb20c70cc048e603dd747757b84913157c78deeca0799201f218efa8d4ada1e
SHA51235c0872a235168ca18fab97aadde541d35082fbbd090bdb5a25cc6e7752c7e27bda4ac86ab0ce7c6b49bbabbaf3bd3b2fd9a29514fb49de58f2b2f54d50e9dc6
-
Filesize
474KB
MD504ec4f58a1f4a87b5eeb1f4b7afc48e0
SHA158dcb1cbbec071d036a07f0e8feb858e4c5b96e7
SHA256bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4
SHA5125b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80
-
Filesize
474KB
MD504ec4f58a1f4a87b5eeb1f4b7afc48e0
SHA158dcb1cbbec071d036a07f0e8feb858e4c5b96e7
SHA256bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4
SHA5125b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80
-
Filesize
370B
MD5f0dd49a8cefd8317b6963063e37a9b30
SHA1437c325d6934090fdcab6fc2e713160fe5f6b958
SHA2562b84a9d71212fd1b9a4f43912dc0befee7807e2a3bea06eb25a5eb104af5ba9c
SHA512cebaf1b0882783e57bf321aac2479b096548c4b37b9131661d3d9c112bda28a3c548bbd4018db06cf985b05e6fd534e2026e702855e474a7bd3e7dddd1486b0b
-
Filesize
1KB
MD566e57d6512fb3d8e0c93a24805b14b40
SHA1f7e9f541de75792fee21e3895398e53f1b250cfc
SHA25655b9d6d1483dbf3ad76afc1c4f77440d0c9e1984b3d6fea25049425b1217da6f
SHA51216e9b23c8e75b6aff5f48fdd655e690f54757a36daa54fbc5003a39338bed3a055314ea9e83710cce770adc608826d9b6ceae7c5f1a246329b9777bd07f10f11
-
Filesize
1KB
MD566e57d6512fb3d8e0c93a24805b14b40
SHA1f7e9f541de75792fee21e3895398e53f1b250cfc
SHA25655b9d6d1483dbf3ad76afc1c4f77440d0c9e1984b3d6fea25049425b1217da6f
SHA51216e9b23c8e75b6aff5f48fdd655e690f54757a36daa54fbc5003a39338bed3a055314ea9e83710cce770adc608826d9b6ceae7c5f1a246329b9777bd07f10f11
-
Filesize
208KB
MD5d82b3fb861129c5d71f0cd2874f97216
SHA1f3fe341d79224126e950d2691d574d147102b18d
SHA256107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c
SHA512244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
502KB
MD5b90622bf3e980bd62f8fbec24a3f9c7b
SHA1b0af2387eadb6b54a826359fe97764022aa0f700
SHA2563db87fa681abac74b44c8fafb73193b155c2c543b66c9f753f3ba6b455c4589e
SHA51226ceba2c1d493c45722d06db0f2e770532a4fe525c1d822bf1520cd9fc1d104469d95c5bd48d86346100f986034fdc8920e91ef238c041b1f0574e8e72217433
-
Filesize
1.9MB
MD566e9a858ad4a1dc41b24149195477d46
SHA19c091a74be0a617f5fc260a7e44b754d73d86ef8
SHA2561fb20c70cc048e603dd747757b84913157c78deeca0799201f218efa8d4ada1e
SHA51235c0872a235168ca18fab97aadde541d35082fbbd090bdb5a25cc6e7752c7e27bda4ac86ab0ce7c6b49bbabbaf3bd3b2fd9a29514fb49de58f2b2f54d50e9dc6
-
Filesize
474KB
MD504ec4f58a1f4a87b5eeb1f4b7afc48e0
SHA158dcb1cbbec071d036a07f0e8feb858e4c5b96e7
SHA256bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4
SHA5125b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80
-
Filesize
474KB
MD504ec4f58a1f4a87b5eeb1f4b7afc48e0
SHA158dcb1cbbec071d036a07f0e8feb858e4c5b96e7
SHA256bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4
SHA5125b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80
-
Filesize
474KB
MD504ec4f58a1f4a87b5eeb1f4b7afc48e0
SHA158dcb1cbbec071d036a07f0e8feb858e4c5b96e7
SHA256bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4
SHA5125b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80
-
Filesize
474KB
MD504ec4f58a1f4a87b5eeb1f4b7afc48e0
SHA158dcb1cbbec071d036a07f0e8feb858e4c5b96e7
SHA256bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4
SHA5125b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80
-
Filesize
208KB
MD5d82b3fb861129c5d71f0cd2874f97216
SHA1f3fe341d79224126e950d2691d574d147102b18d
SHA256107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c
SHA512244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c