Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a.msi
Resource
win7-20231215-en
General
-
Target
693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a.msi
-
Size
5.8MB
-
MD5
9c02a9298b97fcfc5a75fbedf08002bd
-
SHA1
2d3bc2856c015914f2856331a0315298f3c34b0c
-
SHA256
693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a
-
SHA512
fafe5dddb610068cb1044c803a6d681d1739904d8e0c4b2b0fc05bcd55cf9344f69e77c8627ae73713f759117d81a78855ff937ee8650b47ab18d37cb9ca34bc
-
SSDEEP
49152:ppUP3UhtSTK+0THkWsN8SDYdvH5eoQDWhbHHhZgWEF94FJy5jvrgFdbBUleY82cp:pp6nFDkEWoyvy5jvcdbBUkYC+XCFmpC
Malware Config
Signatures
-
Detect DarkGate stealer 2 IoCs
resource yara_rule behavioral1/memory/1676-352-0x0000000003680000-0x0000000004650000-memory.dmp family_darkgate_v6 behavioral1/memory/1676-353-0x0000000004B00000-0x0000000004E5C000-memory.dmp family_darkgate_v6 -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 576 ICACLS.EXE 2224 ICACLS.EXE -
Blocklisted process makes network request 3 IoCs
flow pid Process 3 2280 msiexec.exe 5 2280 msiexec.exe 7 1968 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\f76e86c.msi msiexec.exe File opened for modification C:\Windows\Installer\f76e86c.msi msiexec.exe File created C:\Windows\Installer\f76e86d.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIF353.tmp msiexec.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log EXPAND.EXE File opened for modification C:\Windows\Logs\DPX\setupact.log EXPAND.EXE File opened for modification C:\Windows\Installer\f76e86d.ipi msiexec.exe -
Executes dropped EXE 2 IoCs
pid Process 2860 iTunesHelper.exe 1676 Autoit3.exe -
Loads dropped DLL 3 IoCs
pid Process 2808 MsiExec.exe 2808 MsiExec.exe 2860 iTunesHelper.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1968 msiexec.exe 1968 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeShutdownPrivilege 2280 msiexec.exe Token: SeIncreaseQuotaPrivilege 2280 msiexec.exe Token: SeRestorePrivilege 1968 msiexec.exe Token: SeTakeOwnershipPrivilege 1968 msiexec.exe Token: SeSecurityPrivilege 1968 msiexec.exe Token: SeCreateTokenPrivilege 2280 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2280 msiexec.exe Token: SeLockMemoryPrivilege 2280 msiexec.exe Token: SeIncreaseQuotaPrivilege 2280 msiexec.exe Token: SeMachineAccountPrivilege 2280 msiexec.exe Token: SeTcbPrivilege 2280 msiexec.exe Token: SeSecurityPrivilege 2280 msiexec.exe Token: SeTakeOwnershipPrivilege 2280 msiexec.exe Token: SeLoadDriverPrivilege 2280 msiexec.exe Token: SeSystemProfilePrivilege 2280 msiexec.exe Token: SeSystemtimePrivilege 2280 msiexec.exe Token: SeProfSingleProcessPrivilege 2280 msiexec.exe Token: SeIncBasePriorityPrivilege 2280 msiexec.exe Token: SeCreatePagefilePrivilege 2280 msiexec.exe Token: SeCreatePermanentPrivilege 2280 msiexec.exe Token: SeBackupPrivilege 2280 msiexec.exe Token: SeRestorePrivilege 2280 msiexec.exe Token: SeShutdownPrivilege 2280 msiexec.exe Token: SeDebugPrivilege 2280 msiexec.exe Token: SeAuditPrivilege 2280 msiexec.exe Token: SeSystemEnvironmentPrivilege 2280 msiexec.exe Token: SeChangeNotifyPrivilege 2280 msiexec.exe Token: SeRemoteShutdownPrivilege 2280 msiexec.exe Token: SeUndockPrivilege 2280 msiexec.exe Token: SeSyncAgentPrivilege 2280 msiexec.exe Token: SeEnableDelegationPrivilege 2280 msiexec.exe Token: SeManageVolumePrivilege 2280 msiexec.exe Token: SeImpersonatePrivilege 2280 msiexec.exe Token: SeCreateGlobalPrivilege 2280 msiexec.exe Token: SeBackupPrivilege 1996 vssvc.exe Token: SeRestorePrivilege 1996 vssvc.exe Token: SeAuditPrivilege 1996 vssvc.exe Token: SeBackupPrivilege 1968 msiexec.exe Token: SeRestorePrivilege 1968 msiexec.exe Token: SeRestorePrivilege 276 DrvInst.exe Token: SeRestorePrivilege 276 DrvInst.exe Token: SeRestorePrivilege 276 DrvInst.exe Token: SeRestorePrivilege 276 DrvInst.exe Token: SeRestorePrivilege 276 DrvInst.exe Token: SeRestorePrivilege 276 DrvInst.exe Token: SeRestorePrivilege 276 DrvInst.exe Token: SeLoadDriverPrivilege 276 DrvInst.exe Token: SeLoadDriverPrivilege 276 DrvInst.exe Token: SeLoadDriverPrivilege 276 DrvInst.exe Token: SeRestorePrivilege 1968 msiexec.exe Token: SeTakeOwnershipPrivilege 1968 msiexec.exe Token: SeRestorePrivilege 1968 msiexec.exe Token: SeTakeOwnershipPrivilege 1968 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2280 msiexec.exe 2280 msiexec.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2808 1968 msiexec.exe 34 PID 1968 wrote to memory of 2808 1968 msiexec.exe 34 PID 1968 wrote to memory of 2808 1968 msiexec.exe 34 PID 1968 wrote to memory of 2808 1968 msiexec.exe 34 PID 1968 wrote to memory of 2808 1968 msiexec.exe 34 PID 1968 wrote to memory of 2808 1968 msiexec.exe 34 PID 1968 wrote to memory of 2808 1968 msiexec.exe 34 PID 2808 wrote to memory of 576 2808 MsiExec.exe 35 PID 2808 wrote to memory of 576 2808 MsiExec.exe 35 PID 2808 wrote to memory of 576 2808 MsiExec.exe 35 PID 2808 wrote to memory of 576 2808 MsiExec.exe 35 PID 2808 wrote to memory of 2016 2808 MsiExec.exe 38 PID 2808 wrote to memory of 2016 2808 MsiExec.exe 38 PID 2808 wrote to memory of 2016 2808 MsiExec.exe 38 PID 2808 wrote to memory of 2016 2808 MsiExec.exe 38 PID 2808 wrote to memory of 2860 2808 MsiExec.exe 39 PID 2808 wrote to memory of 2860 2808 MsiExec.exe 39 PID 2808 wrote to memory of 2860 2808 MsiExec.exe 39 PID 2808 wrote to memory of 2860 2808 MsiExec.exe 39 PID 2860 wrote to memory of 1676 2860 iTunesHelper.exe 40 PID 2860 wrote to memory of 1676 2860 iTunesHelper.exe 40 PID 2860 wrote to memory of 1676 2860 iTunesHelper.exe 40 PID 2860 wrote to memory of 1676 2860 iTunesHelper.exe 40 PID 2808 wrote to memory of 1800 2808 MsiExec.exe 42 PID 2808 wrote to memory of 1800 2808 MsiExec.exe 42 PID 2808 wrote to memory of 1800 2808 MsiExec.exe 42 PID 2808 wrote to memory of 1800 2808 MsiExec.exe 42 PID 2808 wrote to memory of 2224 2808 MsiExec.exe 44 PID 2808 wrote to memory of 2224 2808 MsiExec.exe 44 PID 2808 wrote to memory of 2224 2808 MsiExec.exe 44 PID 2808 wrote to memory of 2224 2808 MsiExec.exe 44 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2280
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B63C6657BBF9591827A127F4A88EFC322⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-ed796c33-fba7-4a81-9a03-8d125458c1c4\." /SETINTEGRITYLEVEL (CI)(OI)HIGH3⤵
- Modifies file permissions
PID:576
-
-
C:\Windows\SysWOW64\EXPAND.EXE"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files3⤵
- Drops file in Windows directory
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\MW-ed796c33-fba7-4a81-9a03-8d125458c1c4\files\iTunesHelper.exe"C:\Users\Admin\AppData\Local\Temp\MW-ed796c33-fba7-4a81-9a03-8d125458c1c4\files\iTunesHelper.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\temp\Autoit3.exe"c:\temp\Autoit3.exe" c:\temp\script.a3x4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-ed796c33-fba7-4a81-9a03-8d125458c1c4\files"3⤵PID:1800
-
-
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-ed796c33-fba7-4a81-9a03-8d125458c1c4\." /SETINTEGRITYLEVEL (CI)(OI)LOW3⤵
- Modifies file permissions
PID:2224
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005C0" "00000000000005B0"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e94fb54871208c00df70f708ac47085b
SHA14efc31460c619ecae59c1bce2c008036d94c84b8
SHA2567b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df86
SHA5122e15b76e16264abb9f5ef417752a1cbb75f29c11f96ac7d73793172bd0864db65f2d2b7be0f16bbbe686068f0c368815525f1e39db5a0d6ca3ab18be6923b898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5606691e166b4874b4245bab9de8c9a2f
SHA1aea26e513defb05d6068c6010394f2944158f758
SHA2565d3f8a525138337c699b74ffc41530ada1318e98692436aeabd8159249036d79
SHA5120339709704538fb54b5ec1b650d92c50169d6e353d275a39d9a7255c9a843e3d1c3e83f74deb4628de14e3ad1a40ba3a8611346c5741d1fd6f5f55a66bb48b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560
Filesize264B
MD523d9e71088f59914ca8b49a549ba7556
SHA10052587947ac3ce5c5854703db9da85955b9405f
SHA256931ef64fa473226ba19ef6aa18ba463181ca2eb936be29b2e287d4137214c5be
SHA512ee8c517d75134bd2e369f02611c3a4520e9fee44174ef66936d2ed02d70184639d8e8f0bc5c4a9cdcad547e58c762db006b353a2189b3699f7fa74050fdf17a5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1.2MB
MD555a44f4cad9c443772b3491e703ef394
SHA134365a9b6a71fc1555ceda682669fbf39aaa69f5
SHA25615144c44140df241e8b42ece0e5437de0a7d069700907ea3c8d60fe3c3a372ac
SHA512127b617050a114ca90d922ad9ffdbf876d2774ab7326a9eedca41b460bfb7e03d593237188491d7b7f76ad4225db0dd48d598c80b259996864991228ff1ca848
-
Filesize
1.0MB
MD54f66e509340357424e59761ed46afa3b
SHA160aa3608db448f79abc8ea85d3bcdad048554f38
SHA256cbfd840e60a7fbb3a32302a4258444504888f31214b576ef8ab5afcdc605d6cd
SHA51253c7b4213713cf674b6b9f96424b5cf6904bb8cb7462a7a548effd56ea6904a1a7154bd0de041c527fa345477819817113dc66e4577c022a7cb3f287cfd8cbdc
-
Filesize
358KB
MD5ed6a1c72a75dee15a6fa75873cd64975
SHA167a15ca72e3156f8be6c46391e184087e47f4a0d
SHA2560d8878cca08903777888b3681f90e4a07c7aef7d9600a67dfa985844d4bf5eda
SHA512256c2ebfeb42c2d3340d8bb423ef0ae48d5fb9fe5ca09c363595f51a03007482b67a777e4cae7a8194f69bc3a3fbcdb9abb5c9f92097925272431bb9d50f5c03
-
Filesize
961KB
MD52fd3951d61ab7465f03ef0d854e0e7cb
SHA13a67643b9c7213d4f99bd7aaf4f2fda454b4765d
SHA256c8762efd679a3af2da8ae2ffd220ead336a63abd062d0f5414f233f90904c6a4
SHA51256ce23e541479c2e0721496138aeeef899a082af675d768ec3f190c5688f0842ec71497a661922f3389adbb72d0d5e092f60dc176f5aedd84f3ad960be6a4bc2
-
Filesize
1KB
MD534d31d6be8ffa24117e270ee60e619ba
SHA17a8e2c51d4819cf8aa1a018645ae7ff5bfc9ff44
SHA256fad1e53ab535421cdf47186cd68a40212020ca62ea4c59e6079dccf3d0108a82
SHA5120d41684370dd15fad6fe3592a2896bf4a67994ddd7352316cae7751433b072102c39bed2bada27276146f441f1be88f0bd9c5032b1799ede6e7d5aa2262eeee1
-
Filesize
1KB
MD50ace2589de417984707aba17e41b8cb3
SHA1f2cc2f0c2ff2ca1f6afaf5ac84c41e07e8abe9ea
SHA2567b80a7a7d92be2a21b877fa929ea678946ea8c5055b93322ec68b75a1ae3c073
SHA512467d748eb6232997862393f335aeea327d3565373d488fb48250ba2a1edce5816101ab124f488c878fdf69aef91a1a0c1649feedc0d5b401d5c2e7df7736dc39
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
208KB
MD5d82b3fb861129c5d71f0cd2874f97216
SHA1f3fe341d79224126e950d2691d574d147102b18d
SHA256107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c
SHA512244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
473KB
MD533ca8bc4ac593027fd3e83ba44be54fc
SHA107e2e129a5b0a694d38ac29bc21f74eda100519f
SHA2562296f929340976c680d199ce8e47bd7136d9f4c1f7abc9df79843e094f894236
SHA51205f6f03e69a7d31686f422e422d61161bde45173a6453fdf0392a7a084c9bd69c7c0ed11eb7a37281481eea14497e95c51dfaded21e2ff943fee3f371592db61
-
Filesize
76B
MD5e0cb113b19ce53ef7b72edbb0a4937dc
SHA12499a76ad9ec4a44571bfd8083e09b23373f9f69
SHA25603bed76f17b8574d05e84b81f81c09a33b1ae1555c2caf4783e059b689879ab6
SHA5120b046a6d16d22c0faa3eb729d9b74bfbc87f3cc847fd5ddfa89e573893d215841bae320f0697090b9a30778a07210929ac9c440fca884e920b369698d90a17ca
-
Filesize
907KB
MD5bbccb325d56a9d9b2367252bc10a83ed
SHA1595ef8d98a48e9cf93996dcd31fed7ccab56e4e0
SHA256ff801e28d8244818d2a6e445be9963c299cbdc7bf1b4299cc05064892a244f64
SHA512c1b9ac4e7b9c46dc3116958d7179db4663c96ce7778e6dfcf41702e1fff5bc99df2b78f9685599041035b24da7f95e24a3dbad1a5571e414d1c4e03e622b965d