Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
10-11-2023 18:08
Static task
static1
Behavioral task
behavioral1
Sample
d81c4c5fd1.msi
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
d81c4c5fd1.msi
Resource
win10v2004-20231025-en
General
-
Target
d81c4c5fd1.msi
-
Size
8.7MB
-
MD5
df958065715bfa16d27a40331a2fa2b6
-
SHA1
6492750661945ac8604fb2bd92944b9a18eccdd4
-
SHA256
525b43c320e55981503e6bcb925da6eaf8ff02c692434e10e51562984831a6d0
-
SHA512
6c6784d193775f419ab23d106ccce76b51a84c5c4ab7770a1908f731f278398a3b0f45477b097cb336ae8ee48d980cc23fbdba8af72445a3365acbd2a90d9e26
-
SSDEEP
196608:PeS5hV9/S6WXbfXlTrn7HZ5AQX3AveLukj1w9rRlMtLt:PdhVs6WXjX9HZ5AQX32WDKMtL
Malware Config
Extracted
darkgate
user_871236672
http://adhufdauifadhj13.com
-
alternative_c2_port
8080
-
anti_analysis
true
-
anti_debug
true
-
anti_vm
true
-
c2_port
2351
-
check_disk
true
-
check_ram
true
-
check_xeon
true
-
crypter_au3
false
-
crypter_dll
false
-
crypter_rawstub
true
-
crypto_key
pIXXemAHboYTbK
-
internal_mutex
txtMut
-
minimum_disk
40
-
minimum_ram
6001
-
ping_interval
4
-
rootkit
true
-
startup_persistence
true
-
username
user_871236672
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2356 windbg.exe 2912 Autoit3.exe -
Loads dropped DLL 7 IoCs
pid Process 2864 MsiExec.exe 2864 MsiExec.exe 2864 MsiExec.exe 2864 MsiExec.exe 2864 MsiExec.exe 2356 windbg.exe 2356 windbg.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 632 ICACLS.EXE 2320 ICACLS.EXE -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\Installer\f76da67.msi msiexec.exe File created C:\Windows\Installer\f76da68.ipi msiexec.exe File opened for modification C:\Windows\Logs\DPX\setupact.log EXPAND.EXE File opened for modification C:\Windows\Logs\DPX\setuperr.log EXPAND.EXE File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIDC1C.tmp msiexec.exe File opened for modification C:\Windows\Installer\f76da68.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\Installer\f76da67.msi msiexec.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2224 msiexec.exe 2224 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeShutdownPrivilege 2568 msiexec.exe Token: SeIncreaseQuotaPrivilege 2568 msiexec.exe Token: SeRestorePrivilege 2224 msiexec.exe Token: SeTakeOwnershipPrivilege 2224 msiexec.exe Token: SeSecurityPrivilege 2224 msiexec.exe Token: SeCreateTokenPrivilege 2568 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2568 msiexec.exe Token: SeLockMemoryPrivilege 2568 msiexec.exe Token: SeIncreaseQuotaPrivilege 2568 msiexec.exe Token: SeMachineAccountPrivilege 2568 msiexec.exe Token: SeTcbPrivilege 2568 msiexec.exe Token: SeSecurityPrivilege 2568 msiexec.exe Token: SeTakeOwnershipPrivilege 2568 msiexec.exe Token: SeLoadDriverPrivilege 2568 msiexec.exe Token: SeSystemProfilePrivilege 2568 msiexec.exe Token: SeSystemtimePrivilege 2568 msiexec.exe Token: SeProfSingleProcessPrivilege 2568 msiexec.exe Token: SeIncBasePriorityPrivilege 2568 msiexec.exe Token: SeCreatePagefilePrivilege 2568 msiexec.exe Token: SeCreatePermanentPrivilege 2568 msiexec.exe Token: SeBackupPrivilege 2568 msiexec.exe Token: SeRestorePrivilege 2568 msiexec.exe Token: SeShutdownPrivilege 2568 msiexec.exe Token: SeDebugPrivilege 2568 msiexec.exe Token: SeAuditPrivilege 2568 msiexec.exe Token: SeSystemEnvironmentPrivilege 2568 msiexec.exe Token: SeChangeNotifyPrivilege 2568 msiexec.exe Token: SeRemoteShutdownPrivilege 2568 msiexec.exe Token: SeUndockPrivilege 2568 msiexec.exe Token: SeSyncAgentPrivilege 2568 msiexec.exe Token: SeEnableDelegationPrivilege 2568 msiexec.exe Token: SeManageVolumePrivilege 2568 msiexec.exe Token: SeImpersonatePrivilege 2568 msiexec.exe Token: SeCreateGlobalPrivilege 2568 msiexec.exe Token: SeBackupPrivilege 2768 vssvc.exe Token: SeRestorePrivilege 2768 vssvc.exe Token: SeAuditPrivilege 2768 vssvc.exe Token: SeBackupPrivilege 2224 msiexec.exe Token: SeRestorePrivilege 2224 msiexec.exe Token: SeRestorePrivilege 2576 DrvInst.exe Token: SeRestorePrivilege 2576 DrvInst.exe Token: SeRestorePrivilege 2576 DrvInst.exe Token: SeRestorePrivilege 2576 DrvInst.exe Token: SeRestorePrivilege 2576 DrvInst.exe Token: SeRestorePrivilege 2576 DrvInst.exe Token: SeRestorePrivilege 2576 DrvInst.exe Token: SeLoadDriverPrivilege 2576 DrvInst.exe Token: SeLoadDriverPrivilege 2576 DrvInst.exe Token: SeLoadDriverPrivilege 2576 DrvInst.exe Token: SeRestorePrivilege 2224 msiexec.exe Token: SeTakeOwnershipPrivilege 2224 msiexec.exe Token: SeRestorePrivilege 2224 msiexec.exe Token: SeTakeOwnershipPrivilege 2224 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2568 msiexec.exe 2568 msiexec.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2864 2224 msiexec.exe 34 PID 2224 wrote to memory of 2864 2224 msiexec.exe 34 PID 2224 wrote to memory of 2864 2224 msiexec.exe 34 PID 2224 wrote to memory of 2864 2224 msiexec.exe 34 PID 2224 wrote to memory of 2864 2224 msiexec.exe 34 PID 2224 wrote to memory of 2864 2224 msiexec.exe 34 PID 2224 wrote to memory of 2864 2224 msiexec.exe 34 PID 2864 wrote to memory of 632 2864 MsiExec.exe 35 PID 2864 wrote to memory of 632 2864 MsiExec.exe 35 PID 2864 wrote to memory of 632 2864 MsiExec.exe 35 PID 2864 wrote to memory of 632 2864 MsiExec.exe 35 PID 2864 wrote to memory of 2784 2864 MsiExec.exe 37 PID 2864 wrote to memory of 2784 2864 MsiExec.exe 37 PID 2864 wrote to memory of 2784 2864 MsiExec.exe 37 PID 2864 wrote to memory of 2784 2864 MsiExec.exe 37 PID 2864 wrote to memory of 2356 2864 MsiExec.exe 39 PID 2864 wrote to memory of 2356 2864 MsiExec.exe 39 PID 2864 wrote to memory of 2356 2864 MsiExec.exe 39 PID 2864 wrote to memory of 2356 2864 MsiExec.exe 39 PID 2864 wrote to memory of 2356 2864 MsiExec.exe 39 PID 2864 wrote to memory of 2356 2864 MsiExec.exe 39 PID 2864 wrote to memory of 2356 2864 MsiExec.exe 39 PID 2356 wrote to memory of 2912 2356 windbg.exe 40 PID 2356 wrote to memory of 2912 2356 windbg.exe 40 PID 2356 wrote to memory of 2912 2356 windbg.exe 40 PID 2356 wrote to memory of 2912 2356 windbg.exe 40 PID 2864 wrote to memory of 1800 2864 MsiExec.exe 41 PID 2864 wrote to memory of 1800 2864 MsiExec.exe 41 PID 2864 wrote to memory of 1800 2864 MsiExec.exe 41 PID 2864 wrote to memory of 1800 2864 MsiExec.exe 41 PID 2864 wrote to memory of 2320 2864 MsiExec.exe 43 PID 2864 wrote to memory of 2320 2864 MsiExec.exe 43 PID 2864 wrote to memory of 2320 2864 MsiExec.exe 43 PID 2864 wrote to memory of 2320 2864 MsiExec.exe 43 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\d81c4c5fd1.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2568
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 56B2D0DF86A45115275E172299491CC02⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-682d7358-b4af-4777-95c1-98e25ad9aa4f\." /SETINTEGRITYLEVEL (CI)(OI)HIGH3⤵
- Modifies file permissions
PID:632
-
-
C:\Windows\SysWOW64\EXPAND.EXE"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files3⤵
- Drops file in Windows directory
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\MW-682d7358-b4af-4777-95c1-98e25ad9aa4f\files\windbg.exe"C:\Users\Admin\AppData\Local\Temp\MW-682d7358-b4af-4777-95c1-98e25ad9aa4f\files\windbg.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2356 -
\??\c:\tmpa\Autoit3.exec:\tmpa\Autoit3.exe c:\tmpa\script.au34⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-682d7358-b4af-4777-95c1-98e25ad9aa4f\files"3⤵PID:1800
-
-
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-682d7358-b4af-4777-95c1-98e25ad9aa4f\." /SETINTEGRITYLEVEL (CI)(OI)LOW3⤵
- Modifies file permissions
PID:2320
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003B4" "000000000000052C"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD5c5838722d0d37fc92213494a94164dea
SHA134a88d90b4a86944c0fc15603f02ad7937bb7681
SHA2567faba3c5424ceae3f3a6b6d6a497f6a490d34eb857f6bfa722688aebff5d2bda
SHA5128f4dce3693c0ca4200e74f91e24f7eb86aeb9476a79d03e50730da7f353c7a4b6e0d281e3db1e2a0e690c820cd3543018416de24c716618b442c61df6873cfc8
-
Filesize
1.1MB
MD52ccc17c1a5bb5e656e7f3bb09ff0beff
SHA105866cf7dd5fa99ea852b01c2791b30e7741ea19
SHA256411b6ce9e97a4d828ab43dcf896f8ea09b5e9dc02874909f53ca1e0f10caeed2
SHA51246b7362a2df870018707d89a7340ac0c07a2a357c504dbd944699c0231b4f984661b9f112b9d4869e55cf208ed5968f3ec5b5b35a956329679fb6e48ada7c4c5
-
Filesize
1.8MB
MD5dee56d4f89c71ea6c4f1e75b82f2e9c9
SHA1293ce531cddbf4034782d5dfed1e35c807d75c52
SHA256a8f1ffb62d49d35a0f838f358614333e3d5d68ce5409fdfefcd1aa218d4639cf
SHA512e8c38dc1d7a49d9cb919eae5294cc64379a933cdbd5427ed38c5f915271655f9bd6363e131f9d8a74ffdda23c7b155cc5200ddf999339ea611b98e74355faa0c
-
Filesize
1.8MB
MD5173a98c6c7a166db7c3caa3a06fec06c
SHA13c562051f42353e72ba87b6f54744f6d0107df86
SHA256212a80b3f8e68d00dbd8fc55fc8c4b30ee996348262d5d37e8b3f431a4b2fdad
SHA5129dcd341937eff32762767d3538499d211f5a50fddb4e83d5d1afbeb87a5420c1fb9952ef2ecc744c460b7d53baa2bffbe99087a9f794d25ba78d1af61ea8b54d
-
Filesize
1.6MB
MD594b4895b7b8a60481393b7b8c22ad742
SHA1902796c4aee78ab74e7ba5004625d797d83a8787
SHA256f449409c8747d8e73ac7f8539c6e26d526ef51d267fed40eadce138389db5973
SHA512d1ed6f5a1920eca041a683d71ac562058bc513877e3ae8be18888797d0713e25964c610428f9474d9b539097441002275e1f0023a565bd205cd4153ac282b61e
-
Filesize
92KB
MD516f4aaaf24cff067ecf8de4aa8005fe4
SHA11916630a88c6e7c696932e4a8bdcf8da9199dcec
SHA25600a26f7b0efc9ea14469e9276c4c1f06855aba8cacd155ec02ec8e37e8457ca8
SHA51291fe0dd77e8ba80f6983b58b53a05535bab223bb0880e1427ec6f28352f2f6a4246d316332592d6db240368f76634eb4cced104b392c96038dc40ce4398ad3aa
-
Filesize
2.0MB
MD56f5789e9889332afb380e9788aeef823
SHA110af9a59a77c5200f4bc5b725841df8c5dfa5271
SHA256faed1f3284116efcb406c7999fad56817c6d69925de5425bf48c1d54564230d7
SHA5126a602f09e801a1384170710ebcbe51a328bb3e66312100776142d634856cefc4b196d7fedc5bab6b51ea200043b46135d73d7564cb93bb8acd536ae9f8316a14
-
Filesize
1.9MB
MD5cbb98bb1b5c503cab6f136e03f35337a
SHA15c4d4c9b8681b53767a8b84b225d9b90a9e37521
SHA2564c7b64a903c4156fbad9f5e59f653fe5bab25acf3b5c50fc447e3cf1b96e8f01
SHA5127ac39457cb6c57789d339f3d64fd939e3d04bf890320889ab2c419dc1217242f74cc9949c5fa6889f52bf86051ff8b8b2826f31989bf2cc43a0d7e8da5933102
-
Filesize
474KB
MD504ec4f58a1f4a87b5eeb1f4b7afc48e0
SHA158dcb1cbbec071d036a07f0e8feb858e4c5b96e7
SHA256bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4
SHA5125b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80
-
Filesize
474KB
MD504ec4f58a1f4a87b5eeb1f4b7afc48e0
SHA158dcb1cbbec071d036a07f0e8feb858e4c5b96e7
SHA256bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4
SHA5125b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80
-
Filesize
370B
MD5c1068c54c5d9d662bc0d598bde6b8a09
SHA15e8226bf6d40c18b2c045fc64679b0ae4c49ffc3
SHA2564629fee22d0adf43d2bd044f0b78c7827ac0da619f1f5d49143da8a1898bc66a
SHA5129b04205246c80a2a66e22372d28b14cc4822b630d59ffa0d299912ca2d909ff377ef7e476389c6791c10e0b712dc18749136505116f8dde4b8ebcbdbde74b25a
-
Filesize
1KB
MD52ac3681c1c9e11b00d1edbe87dbebd02
SHA1e758be5c8c398cc54f1820f0ae833db294c933a7
SHA256e19ae41221dca88b03b06821dfe046489de761ce70da188b8b90ecc97a632d8b
SHA51284e8c3fcf7028ae5c7d090af1f0576ac50bf8b4c6b6b105d04e219c46d6112f1f70c139cdacad8a25638c13192db7520149390608c99971a92566453e643e5ba
-
Filesize
1KB
MD52ac3681c1c9e11b00d1edbe87dbebd02
SHA1e758be5c8c398cc54f1820f0ae833db294c933a7
SHA256e19ae41221dca88b03b06821dfe046489de761ce70da188b8b90ecc97a632d8b
SHA51284e8c3fcf7028ae5c7d090af1f0576ac50bf8b4c6b6b105d04e219c46d6112f1f70c139cdacad8a25638c13192db7520149390608c99971a92566453e643e5ba
-
Filesize
208KB
MD5d82b3fb861129c5d71f0cd2874f97216
SHA1f3fe341d79224126e950d2691d574d147102b18d
SHA256107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c
SHA512244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
666KB
MD5e89c0798322de95734d6499959c3a0e5
SHA1b5375c0edcec401e9b43af9a83f3229a7907b084
SHA256ef114b57f8144a8745cfd78407ac498b89303c4824a95e6a5dc44b460105b1c4
SHA512fdeb2941cff4a51234b312edf0e50eebaa42fb1c2dc801c22f4af9a2cb3b8d9440cf0f46b2c4810cabc765d44177d24ea5b8b1e6218c25701c3a1c8baa04cab0
-
Filesize
1.9MB
MD5cbb98bb1b5c503cab6f136e03f35337a
SHA15c4d4c9b8681b53767a8b84b225d9b90a9e37521
SHA2564c7b64a903c4156fbad9f5e59f653fe5bab25acf3b5c50fc447e3cf1b96e8f01
SHA5127ac39457cb6c57789d339f3d64fd939e3d04bf890320889ab2c419dc1217242f74cc9949c5fa6889f52bf86051ff8b8b2826f31989bf2cc43a0d7e8da5933102
-
Filesize
474KB
MD504ec4f58a1f4a87b5eeb1f4b7afc48e0
SHA158dcb1cbbec071d036a07f0e8feb858e4c5b96e7
SHA256bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4
SHA5125b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80
-
Filesize
474KB
MD504ec4f58a1f4a87b5eeb1f4b7afc48e0
SHA158dcb1cbbec071d036a07f0e8feb858e4c5b96e7
SHA256bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4
SHA5125b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80
-
Filesize
474KB
MD504ec4f58a1f4a87b5eeb1f4b7afc48e0
SHA158dcb1cbbec071d036a07f0e8feb858e4c5b96e7
SHA256bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4
SHA5125b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80
-
Filesize
474KB
MD504ec4f58a1f4a87b5eeb1f4b7afc48e0
SHA158dcb1cbbec071d036a07f0e8feb858e4c5b96e7
SHA256bd1af3dba56b129e6c624297eeed40c898fa2981fce5caafe467d88a748988a4
SHA5125b572a504fac599e7e3f726d391e8ffdc2d083745609315a203000e8dc79b94d777fc520eb6530444d84f1ac9aad51406b91b527d8434077a58524feeccbbd80
-
Filesize
208KB
MD5d82b3fb861129c5d71f0cd2874f97216
SHA1f3fe341d79224126e950d2691d574d147102b18d
SHA256107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c
SHA512244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c