Analysis
-
max time kernel
101s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2024, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.exe
Resource
win10v2004-20241007-en
General
-
Target
WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.exe
-
Size
3.8MB
-
MD5
fd4d06722033dcfbc3e7993bcf2f574c
-
SHA1
3e0a7ab1bc781353deb0800408b0074b5589b018
-
SHA256
fe407790dad4c2b82a80548e5717a25994a35249209b94a2b13df894dca0a28a
-
SHA512
2c9434b08c0146e630c71cbe9fd82d25997441565e6b3bce7057c06a6b3befa646c4d79af514d89445619503c82f40c2cb462e0666d06ace7d94322a2ea9950b
-
SSDEEP
98304:xaROAR3Zsbt5be4s7JviZUnk4BhvbzkzmOJdrX6OL:xIiS4gHnk4z3krRL
Malware Config
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://hallowed-noisy.sbs
Signatures
-
D3fackloader
D3fackloader is a loader and downloader using Inno Setup.
-
D3fackloader family
-
Lumma family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
pid Process 2084 Powershell.exe 4136 Powershell.exe 1128 powershell.exe 2084 Powershell.exe 1920 powershell.exe -
Downloads MZ/PE file
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2012 attrib.exe 744 attrib.exe -
Executes dropped EXE 5 IoCs
pid Process 3160 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp 3928 241.exe 4920 javaw.exe 2696 MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe 3456 MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe -
Loads dropped DLL 22 IoCs
pid Process 3160 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp 3160 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp 3160 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp 3160 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp 3160 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp 3160 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp 3160 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp 4920 javaw.exe 4920 javaw.exe 4920 javaw.exe 4920 javaw.exe 4920 javaw.exe 4920 javaw.exe 4920 javaw.exe 4920 javaw.exe 4920 javaw.exe 4920 javaw.exe 4920 javaw.exe 4920 javaw.exe 4920 javaw.exe 4920 javaw.exe 4920 javaw.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2696 set thread context of 3456 2696 MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe 113 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 241.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language javaw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3160 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp 3160 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp 2084 Powershell.exe 4136 Powershell.exe 4136 Powershell.exe 2084 Powershell.exe 1920 powershell.exe 1128 powershell.exe 1920 powershell.exe 1128 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4136 Powershell.exe Token: SeDebugPrivilege 2084 Powershell.exe Token: SeDebugPrivilege 1128 powershell.exe Token: SeDebugPrivilege 1920 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3160 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4920 javaw.exe 4920 javaw.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1176 wrote to memory of 3160 1176 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.exe 82 PID 1176 wrote to memory of 3160 1176 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.exe 82 PID 1176 wrote to memory of 3160 1176 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.exe 82 PID 3160 wrote to memory of 560 3160 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp 92 PID 3160 wrote to memory of 560 3160 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp 92 PID 3160 wrote to memory of 560 3160 WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp 92 PID 560 wrote to memory of 2012 560 cmd.exe 94 PID 560 wrote to memory of 2012 560 cmd.exe 94 PID 560 wrote to memory of 2012 560 cmd.exe 94 PID 560 wrote to memory of 2008 560 cmd.exe 95 PID 560 wrote to memory of 2008 560 cmd.exe 95 PID 560 wrote to memory of 2008 560 cmd.exe 95 PID 2008 wrote to memory of 1460 2008 cmd.exe 96 PID 2008 wrote to memory of 1460 2008 cmd.exe 96 PID 2008 wrote to memory of 1460 2008 cmd.exe 96 PID 560 wrote to memory of 744 560 cmd.exe 97 PID 560 wrote to memory of 744 560 cmd.exe 97 PID 560 wrote to memory of 744 560 cmd.exe 97 PID 560 wrote to memory of 3928 560 cmd.exe 98 PID 560 wrote to memory of 3928 560 cmd.exe 98 PID 560 wrote to memory of 3928 560 cmd.exe 98 PID 3928 wrote to memory of 4920 3928 241.exe 99 PID 3928 wrote to memory of 4920 3928 241.exe 99 PID 3928 wrote to memory of 4920 3928 241.exe 99 PID 4920 wrote to memory of 2084 4920 javaw.exe 100 PID 4920 wrote to memory of 2084 4920 javaw.exe 100 PID 4920 wrote to memory of 2084 4920 javaw.exe 100 PID 4920 wrote to memory of 4136 4920 javaw.exe 101 PID 4920 wrote to memory of 4136 4920 javaw.exe 101 PID 4920 wrote to memory of 4136 4920 javaw.exe 101 PID 2084 wrote to memory of 1128 2084 Powershell.exe 104 PID 2084 wrote to memory of 1128 2084 Powershell.exe 104 PID 2084 wrote to memory of 1128 2084 Powershell.exe 104 PID 4136 wrote to memory of 1920 4136 Powershell.exe 106 PID 4136 wrote to memory of 1920 4136 Powershell.exe 106 PID 4136 wrote to memory of 1920 4136 Powershell.exe 106 PID 4920 wrote to memory of 3208 4920 javaw.exe 108 PID 4920 wrote to memory of 3208 4920 javaw.exe 108 PID 4920 wrote to memory of 3208 4920 javaw.exe 108 PID 1624 wrote to memory of 2696 1624 explorer.exe 110 PID 1624 wrote to memory of 2696 1624 explorer.exe 110 PID 1624 wrote to memory of 2696 1624 explorer.exe 110 PID 2696 wrote to memory of 3456 2696 MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe 113 PID 2696 wrote to memory of 3456 2696 MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe 113 PID 2696 wrote to memory of 3456 2696 MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe 113 PID 2696 wrote to memory of 3456 2696 MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe 113 PID 2696 wrote to memory of 3456 2696 MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe 113 PID 2696 wrote to memory of 3456 2696 MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe 113 PID 2696 wrote to memory of 3456 2696 MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe 113 PID 2696 wrote to memory of 3456 2696 MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe 113 PID 2696 wrote to memory of 3456 2696 MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe 113 PID 2696 wrote to memory of 3456 2696 MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe 113 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2012 attrib.exe 744 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.exe"C:\Users\Admin\AppData\Local\Temp\WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\is-BO7P7.tmp\WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp"C:\Users\Admin\AppData\Local\Temp\is-BO7P7.tmp\WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.tmp" /SL5="$50110,275511,275456,C:\Users\Admin\AppData\Local\Temp\WITCHINTHEWOODSBOTANICALS-DOCUSIGNLLC.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" cmd /c interim.cmd3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\attrib.exeattrib +s +h /D "C:\Users\Admin\AppData\Local\Temp\msdtadmin\*.*"4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2012
-
-
C:\Windows\SysWOW64\cmd.execmd /c tar xf interim4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\tar.exetar xf interim5⤵
- System Location Discovery: System Language Discovery
PID:1460
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h /D "C:\Users\Admin\AppData\Local\Temp\msdtadmin\*.*"4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:744
-
-
C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\241.exe".\241\241.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\bin\javaw.exe"C:\Users\Admin\AppData\Local\Temp\msdtadmin\241\jre\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "lib\.;lib\..;lib\activation.jar;lib\asm-all.jar;lib\commons-email.jar;lib\dn-compiled-module.jar;lib\dn-php-sdk.jar;lib\gson.jar;lib\jfoenix.jar;lib\jkeymaster.jar;lib\jna.jar;lib\jphp-app-framework.jar;lib\jphp-core.jar;lib\jphp-desktop-ext.jar;lib\jphp-desktop-hotkey-ext.jar;lib\jphp-gui-ext.jar;lib\jphp-gui-jfoenix-ext.jar;lib\jphp-json-ext.jar;lib\jphp-jsoup-ext.jar;lib\jphp-mail-ext.jar;lib\jphp-runtime.jar;lib\jphp-systemtray-ext.jar;lib\jphp-xml-ext.jar;lib\jphp-zend-ext.jar;lib\jphp-zip-ext.jar;lib\jsoup.jar;lib\mail.jar;lib\slf4j-api.jar;lib\slf4j-simple.jar;lib\zt-zip.jar" org.develnext.jphp.ext.javafx.FXLauncher5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exePowershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command "Add-MpPreference -Force -ExclusionPath "C:\""' -Verb RunAs}"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -Force -ExclusionPath C:"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exePowershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command "Set-MpPreference -Force -DisableBehaviorMonitoring "' -Verb RunAs}"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Set-MpPreference -Force -DisableBehaviorMonitoring7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe6⤵
- System Location Discovery: System Language Discovery
PID:3208
-
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe"C:\Users\Admin\AppData\Local\Temp\MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe"C:\Users\Admin\AppData\Local\Temp\MDYxZThmODFjZTllMGViODk0ODdmMzNiNTMxMDEzMDM.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
232KB
MD555c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
Filesize
4.6MB
MD5510ba2af18d9c64ce945ab97d4be68e7
SHA134775cf6381763d9e302493a458a62b4763974a8
SHA256743a0cc6f1bb3baafe1cda6384ae28f0c9a2f7cfe8acfd52c41174712b3d4e8a
SHA512607cfab850301d6ea17c461db8daeb8895e69c7b85706c1a009b66950723a7be1492793ba83d40bffa8bfd1cd903fb93cf8435a20d64ea11f8e7e534d98986d9
-
Filesize
32KB
MD500619cc7eb9108c9285a23ef9242b2ef
SHA1dafbf6f4ee0d117a8418809e94f7c505109147bd
SHA256b3ee7af6bcedbdc54828b21ce2a9ca2e6d01a6c4bc7b28b530af651e9fe8d153
SHA512c2923c71268680ced2ffb4698cc40cd23eb4cf3eed03661ac25578e7154b6d08ea3c2ba5b98ab62e059e92c5a5214869a5b8ba981000241eb9f9f255c70b8ac0
-
Filesize
3.7MB
MD539c302fe0781e5af6d007e55f509606a
SHA123690a52e8c6578de6a7980bb78aae69d0f31780
SHA256b1fbdbb1e4c692b34d3b9f28f8188fc6105b05d311c266d59aa5e5ec531966bc
SHA51267f91a75e16c02ca245233b820df985bd8290a2a50480dff4b2fd2695e3cf0b4534eb1bf0d357d0b14f15ce8bd13c82d2748b5edd9cc38dc9e713f5dc383ed77
-
Filesize
123KB
MD573bd0b62b158c5a8d0ce92064600620d
SHA163c74250c17f75fe6356b649c484ad5936c3e871
SHA256e7b870deb08bc864fa7fd4dec67cef15896fe802fafb3009e1b7724625d7da30
SHA512eba1cf977365446b35740471882c5209773a313de653404a8d603245417d32a4e9f23e3b6cd85721143d2f9a0e46ed330c3d8ba8c24aee390d137f9b5cd68d8f
-
Filesize
187KB
MD548c96771106dbdd5d42bba3772e4b414
SHA1e84749b99eb491e40a62ed2e92e4d7a790d09273
SHA256a96d26428942065411b1b32811afd4c5557c21f1d9430f3696aa2ba4c4ac5f22
SHA5129f891c787eb8ceed30a4e16d8e54208fa9b19f72eeec55b9f12d30dc8b63e5a798a16b1ccc8cea3e986191822c4d37aedb556e534d2eb24e4a02259555d56a2c
-
Filesize
755KB
MD5bf38660a9125935658cfa3e53fdc7d65
SHA10b51fb415ec89848f339f8989d323bea722bfd70
SHA25660c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa
SHA51225f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1
-
Filesize
78KB
MD5691b937a898271ee2cffab20518b310b
SHA1abedfcd32c3022326bc593ab392dea433fcf667c
SHA2562f5f1199d277850a009458edb5202688c26dd993f68fe86ca1b946dc74a36d61
SHA5121c09f4e35a75b336170f64b5c7254a51461dc1997b5862b62208063c6cf84a7cb2d66a67e947cbbf27e1cf34ccd68ba4e91c71c236104070ef3beb85570213ec
-
Filesize
50KB
MD595edb3cb2e2333c146a4dd489ce67cbd
SHA179013586a6e65e2e1f80e5caf9e2aa15b7363f9a
SHA25696cf590bddfd90086476e012d9f48a9a696efc054852ef626b43d6d62e72af31
SHA512ab671f1bce915d748ee49518cc2a666a2715b329cab4ab8f6b9a975c99c146bb095f7a4284cd2aaf4a5b4fcf4f939f54853af3b3acc4205f89ed2ba8a33bb553
-
Filesize
38KB
MD5de2167a880207bbf7464bcd1f8bc8657
SHA10ff7a5ea29c0364a1162a090dffc13d29bc3d3c7
SHA256fd856ea783ad60215ce2f920fcb6bb4e416562d3c037c06d047f1ec103cd10b3
SHA512bb83377c5cff6117cec6fbadf6d40989ce1ee3f37e4ceba17562a59ea903d8962091146e2aa5cc44cfdddf280da7928001eea98abf0c0942d69819b2433f1322
-
Filesize
68KB
MD5cb99b83bbc19cd0e1c2ec6031d0a80bc
SHA1927e1e24fd19f9ca8b5191ef3cc746b74ab68bcd
SHA25668148243e3a03a3a1aaf4637f054993cb174c04f6bd77894fe84d74af5833bec
SHA51229c4978fa56f15025355ce26a52bdf8197b8d8073a441425df3dfc93c7d80d36755cc05b6485dd2e1f168df2941315f883960b81368e742c4ea8e69dd82fa2ba
-
Filesize
4KB
MD5f6258230b51220609a60aa6ba70d68f3
SHA1b5b95dd1ddcd3a433db14976e3b7f92664043536
SHA25622458853da2415f7775652a7f57bb6665f83a9ae9fb8bd3cf05e29aac24c8441
SHA512b2dfcfdebf9596f2bb05f021a24335f1eb2a094dca02b2d7dd1b7c871d5eecda7d50da7943b9f85edb5e92d9be6b6adfd24673ce816df3960e4d68c7f894563f
-
Filesize
17.3MB
MD5042b3675517d6a637b95014523b1fd7d
SHA182161caf5f0a4112686e4889a9e207c7ba62a880
SHA256a570f20f8410f9b1b7e093957bf0ae53cae4731afaea624339aa2a897a635f22
SHA5127672d0b50a92e854d3bd3724d01084cc10a90678b768e9a627baf761993e56a0c6c62c19155649fe9a8ceeabf845d86cbbb606554872ae789018a8b66e5a2b35
-
Filesize
1KB
MD577abe2551c7a5931b70f78962ac5a3c7
SHA1a8bb53a505d7002def70c7a8788b9a2ea8a1d7bc
SHA256c557f0c9053301703798e01dc0f65e290b0ae69075fb49fcc0e68c14b21d87f4
SHA5129fe671380335804d4416e26c1e00cded200687db484f770ebbdb8631a9c769f0a449c661cb38f49c41463e822beb5248e69fd63562c3d8c508154c5d64421935
-
Filesize
657B
MD59fd47c1a487b79a12e90e7506469477b
SHA17814df0ff2ea1827c75dcd73844ca7f025998cc6
SHA256a73aea3074360cf62adedc0c82bc9c0c36c6a777c70da6c544d0fba7b2d8529e
SHA51297b9d4c68ac4b534f86efa9af947763ee61aee6086581d96cbf7b3dbd6fd5d9db4b4d16772dce6f347b44085cef8a6ea3bfd3b84fbd9d4ef763cef39255fbce3
-
Filesize
619KB
MD5fd1434c81219c385f30b07e33cef9f30
SHA10b5ee897864c8605ef69f66dfe1e15729cfcbc59
SHA256bc3a736e08e68ace28c68b0621dccfb76c1063bd28d7bd8fce7b20e7b7526cc5
SHA5129a778a3843744f1fabad960aa22880d37c30b1cab29e123170d853c9469dc54a81e81a9070e1de1bf63ba527c332bb2b1f1d872907f3bdce33a6898a02fef22d
-
Filesize
2KB
MD591aa6ea7320140f30379f758d626e59d
SHA13be2febe28723b1033ccdaa110eaf59bbd6d1f96
SHA2564af21954cdf398d1eae795b6886ca2581dac9f2f1d41c98c6ed9b5dbc3e3c1d4
SHA51203428803f1d644d89eb4c0dcbdea93acaac366d35fc1356ccabf83473f4fef7924edb771e44c721103cec22d94a179f092d1bfd1c0a62130f076eb82a826d7cb
-
Filesize
26KB
MD5409c132fe4ea4abe9e5eb5a48a385b61
SHA1446d68298be43eb657934552d656fa9ae240f2a2
SHA2564d9e5a12b8cac8b36ecd88468b1c4018bc83c97eb467141901f90358d146a583
SHA5127fed286ac9aed03e2dae24c3864edbbf812b65965c7173cc56ce622179eb5f872f77116275e96e1d52d1c58d3cdebe4e82b540b968e95d5da656aa74ad17400d
-
Filesize
67KB
MD546a37512971d8eca81c3fcf245bf07d2
SHA1485de3a253e23f645037828c07f1d7f1af40763a
SHA256ae475120e9fcd99b4b00b38329bd61cdc5eb754eee03fe66c01f50e137724f99
SHA51249119b0cc3af02700685a55c6f15e6d40643f81640e642b9ea39a59e18d542f8837d30b43b5be006ce1a98c8ec9729bb2165c0442978168f64caa2fc6e3cb93d
-
Filesize
241KB
MD5f5ad16c7f0338b541978b0430d51dc83
SHA12ea49e08b876bbd33e0a7ce75c8f371d29e1f10a
SHA2567fbffbc1db3422e2101689fd88df8384b15817b52b9b2b267b9f6d2511dc198d
SHA51282e6749f4a6956f5b8dd5a5596ca170a1b7ff4e551714b56a293e6b8c7b092cbec2bec9dc0d9503404deb8f175cbb1ded2e856c6bc829411c8ed311c1861336a
-
Filesize
48KB
MD5f045afea3cb27ead50b0c59fc3f0dffd
SHA1c1a7133db9008fa1eae082e6158c3f4c128ec27e
SHA256268253139a8936afa68909df8ced52a9d769665ee9373a60e19a93f254fd54b5
SHA5120e2d2cbef9d4c19310748e37ad909e57aa37490a7dfd41557b1914857fe7235e434a6fdee00f663688941da3e70fe882b5c63df10ba8c7ad18936959f906722b
-
Filesize
1.0MB
MD592729552284021914f65d903ad034ce6
SHA1f2c2e6bc73e31bbb91f760f8e64dc90f6585777d
SHA256502659bdc8e87682ef93ecba4ce743a6dfbe9fb5c43628c94200d4a01c4b1c05
SHA512fe8741ed1ce40bb4490af6529512c9c4c704266a48b7853f816362adbddcc9a09f756599856195da44af93b3961faff832db156fb6d41858c1a5e0089636d83b
-
Filesize
12KB
MD53e5e8cccff7ff343cbfe22588e569256
SHA166756daa182672bff27e453eed585325d8cc2a7a
SHA2560f26584763ef1c5ec07d1f310f0b6504bc17732f04e37f4eb101338803be0dc4
SHA5128ea5f31e25c3c48ee21c51abe9146ee2a270d603788ec47176c16acac15dad608eef4fa8ca0f34a1bbc6475c29e348bd62b0328e73d2e1071aaa745818867522
-
Filesize
226KB
MD55134a2350f58890ffb9db0b40047195d
SHA1751f548c85fa49f330cecbb1875893f971b33c4e
SHA2562d43eb5ea9e133d2ee2405cc14f5ee08951b8361302fdd93494a3a997b508d32
SHA512c3cdaf66a99e6336abc80ff23374f6b62ac95ab2ae874c9075805e91d849b18e3f620cc202b4978fc92b73d98de96089c8714b1dd096b2ae1958cfa085715f7a
-
Filesize
2.3MB
MD56316f84bc78d40b138dab1adc978ca5d
SHA1b12ea05331ad89a9b09937367ebc20421f17b9ff
SHA256d637e3326f87a173abd5f51ac98906a3237b9e511d07d31d6aafcf43f33dac17
SHA5121cdca01ed9c2bc607207c8c51f4b532f4153e94b3846308332eccae25f9c5fddf8279e3063f44a75dd43d696eab0f9f340f9bf2f3ec805ab0f2f1de5135a426c
-
Filesize
51KB
MD521a017201cbb16ae0546069d4371f1c2
SHA19f1e8c9341a8a0c51299b961c4f6c7661c822756
SHA256a2d68aaf08f15ff1c3b9b224641e8b4c35ee30b10f655d6420571b0429f19c87
SHA5126c65740c17de72ba7b0df95aa29d095a1502f298924c63f364328f6fbb38920e92e0246d28a642f7c9fe3ab582341e607b0ae01515d470b4595d698ce81363d6
-
Filesize
1.1MB
MD58d536ddbe44d1500d262960891911f91
SHA1fcc5b10cb812c41b00708e7b57baccc3aee5567c
SHA256edc2a2c4f9b0b55fdc66aef3c9a9ddfff97e4b892842d4c0e1bc6eaff704abcb
SHA5120ff97f158d1b1fbbef35813a1be2cc9f0c2321fa66e47af3276d3cb93178e668a652bac8a1aee82986dbf86e6db34518045eddfdd10ca827f3e4762faaa814f3
-
Filesize
103KB
MD50c8768cdeb3e894798f80465e0219c05
SHA1c4da07ac93e4e547748ecc26b633d3db5b81ce47
SHA25615f36830124fc7389e312cf228b952024a8ce8601bf5c4df806bc395d47db669
SHA51235db507a3918093b529547e991ab6c1643a96258fc95ba1ea7665ff762b0b8abb1ef732b3854663a947effe505be667bd2609ffcccb6409a66df605f971da106
-
Filesize
464KB
MD57e5e3d6d352025bd7f093c2d7f9b21ab
SHA1ad9bfc2c3d70c574d34a752c5d0ebcc43a046c57
SHA2565b37e8ff2850a4cbb02f9f02391e9f07285b4e0667f7e4b2d4515b78e699735a
SHA512c19c29f8ad8b6beb3eed40ab7dc343468a4ca75d49f1d0d4ea0b4a5cee33f745893fba764d35c8bd157f7842268e0716b1eb4b8b26dcf888fb3b3f4314844aad
-
Filesize
16KB
MD5b50e2c75f5f0e1094e997de8a2a2d0ca
SHA1d789eb689c091536ea6a01764bada387841264cb
SHA256cf4068ebb5ecd47adec92afba943aea4eb2fee40871330d064b69770cccb9e23
SHA51257d8ac613805edada6aeba7b55417fd7d41c93913c56c4c2c1a8e8a28bbb7a05aade6e02b70a798a078dc3c747967da242c6922b342209874f3caf7312670cb0
-
Filesize
5KB
MD522acc05e1efc1d4c5faa0359ce725d47
SHA1458e7f911d024a3d786e76f256b017b0901f48f8
SHA256c55c267d954ec9f24226780ee49fa7e1bc2baec3af6bfc0caa6cc1b49d8ca90c
SHA512b11754f5337a73d317ae311fd4c20c0b548e1163107b741cc9e6d4d9027a8f99551e3184a83f9ad20098092e87ef1741c1e437058b7cac92727124589c303ef5
-
Filesize
688KB
MD56696368a09c7f8fed4ea92c4e5238cee
SHA1f89c282e557d1207afd7158b82721c3d425736a7
SHA256c25d7a7b8f0715729bccb817e345f0fdd668dd4799c8dab1a4db3d6a37e7e3e4
SHA5120ab24f07f956e3cdcd9d09c3aa4677ff60b70d7a48e7179a02e4ff9c0d2c7a1fc51624c3c8a5d892644e9f36f84f7aaf4aa6d2c9e1c291c88b3cff7568d54f76
-
Filesize
50KB
MD5d093f94c050d5900795de8149cb84817
SHA154058dda5c9e66a22074590072c8a48559bba1fb
SHA2564bec0794a0d69debe2f955bf495ea7c0858ad84cb0d2d549cacb82e70c060cba
SHA5123faaa415fba5745298981014d0042e8e01850fccaac22f92469765fd8c56b920da877ff3138a629242d9c52e270e7e2ce89e7c69f6902859f48ea0359842e2fb
-
Filesize
16KB
MD5fde38932b12fc063451af6613d4470cc
SHA1bc08c114681a3afc05fb8c0470776c3eae2eefeb
SHA2569967ea3c3d1aee8db5a723f714fba38d2fc26d8553435ab0e1d4e123cd211830
SHA5120f211f81101ced5fff466f2aab0e6c807bb18b23bc4928fe664c60653c99fa81b34edf5835fcc3affb34b0df1fa61c73a621df41355e4d82131f94fcc0b0e839
-
Filesize
19KB
MD5d963210c02cd1825e967086827da8294
SHA126c4d004b5ffdb8f81de2d6b158a3f34819faf01
SHA2567908145cf17301bedefd6e3af8c93e0320582c0562919ffb56cc21b7fd532b96
SHA512756c21dc1a02d579f0e2ed39e5bedca5491087cdc28e3e96c8663a493bcfeeeeea44dc40681ec6341426dfa995883dbce11b76d1f921e043ae220399a9e554fb
-
Filesize
9KB
MD5405861c5544a92fb345ebca30dcaec2d
SHA1f8fe5dcb597fff1bf6489f1283a0157be1a313c3
SHA256fb206af4ddcc568eb1f7b38b7266be683167c95befef797b0965b4533647b17d
SHA512f1330e5b39a2af8cf378172d9311a50b65aaa7d0c793b354efbcaa3c843bddeffb756a50f1cb9adaf974c3bb3fa6b5ef4b779e1efeeeb1b3946605f47053fe03
-
Filesize
1.1MB
MD5d5ef47c915bef65a63d364f5cf7cd467
SHA1f711f3846e144dddbfb31597c0c165ba8adf8d6b
SHA2569c287472408857301594f8f7bda108457f6fdae6e25c87ec88dbf3012e5a98b6
SHA51204aeb956bfcd3bd23b540f9ad2d4110bb2ffd25fe899152c4b2e782daa23a676df9507078ecf1bfc409ddfbe2858ab4c4c324f431e45d8234e13905eb192bae8
-
Filesize
18KB
MD5acc229916e4c7c666b45072b525041e7
SHA136f508f20347fce608130806a26cd796daf5dd20
SHA25691ed39e83199784b0fb359a9e2b319572b2ba1b1f4492e82a590bf488650f7f4
SHA512c537c442874c63103f5ae934b6fdd03834e62b7374070efcbcd05b606d02274679078c38437cb1de79e3284f39fc2981c79274d93b0ba4afeb7c6942cca54235
-
Filesize
19KB
MD50a79304556a1289aa9e6213f574f3b08
SHA17ee3bde3b1777bf65d4f62ce33295556223a26cd
SHA256434e57fffc7df0b725c1d95cabafdcdb83858ccb3e5e728a74d3cf33a0ca9c79
SHA5121560703d0c162d73c99cef9e8ddc050362e45209cc8dea6a34a49e2b6f99aae462eae27ba026bdb29433952b6696896bb96998a0f6ac0a3c1dbbb2f6ebc26a7e
-
Filesize
95KB
MD54bc2aea7281e27bc91566377d0ed1897
SHA1d02d897e8a8aca58e3635c009a16d595a5649d44
SHA2564aef566bbf3f0b56769a0c45275ebbf7894e9ddb54430c9db2874124b7cea288
SHA512da35bb2f67bca7527dc94e5a99a162180b2701ddca2c688d9e0be69876aca7c48f192d0f03d431ccd2d8eec55e0e681322b4f15eba4db29ef5557316e8e51e10
-
Filesize
12KB
MD520f6f88989e806d23c29686b090f6190
SHA11fdb9a66bb5ca587c05d3159829a8780bb66c87d
SHA2569d5f06d539b91e98fd277fc01fd2f9af6fea58654e3b91098503b235a83abb16
SHA5122798bb1dd0aa121cd766bd5b47d256b1a528e9db83ed61311fa685f669b7f60898118ae8c69d2a30d746af362b810b133103cbe426e0293dd2111aca1b41ccea
-
Filesize
342KB
MD536145fee38e79b81035787f1be296a52
SHA133ee82e324f4b1e40167f3dc5e01234a1c5cab61
SHA2566ebe6abd7775c10a49407ae22db45c840cd2cdaf715866a5b0b5af70941c3f4a
SHA5123b00b07320831f075a6af9ac1863b8756fe4f99a1b4f2e53578dca17fdaf7bdb147279225045e9eeeba4898fe321cf5457832b8e6a1a5b71acff9a1c10392659
-
Filesize
496KB
MD5ec6e4e5ebd85a221b395b8f3b37545e6
SHA185319c87280f30e1afc54c355f91f44741beac49
SHA25617bddec86cfe01092bd358c249b7c2ce4295c13cdad314d8eacc8426fdbe3034
SHA5123e3e406542676f27b5008a061ceaa90580e2f9fd78b31576c99f7612033f2dd0a14824e7bfb16e6f1a12ad96985319fd6f1c2706230019c76ce22da8c7dfd181
-
Filesize
40KB
MD5caafe376afb7086dcbee79f780394ca3
SHA1da76ca59f6a57ee3102f8f9bd9cee742973efa8a
SHA25618c4a0095d5c1da6b817592e767bb23d29dd2f560ad74df75ff3961dbde25b79
SHA5125dd6271fd5b34579d8e66271bab75c89baca8b2ebeaa9966de391284bd08f2d720083c6e0e1edda106ecf8a04e9a32116de6873f0f88c19c049c0fe27e5d820b
-
Filesize
14KB
MD5722bb90689aecc523e3fe317e1f0984b
SHA18dacf9514f0c707cbbcdd6fd699e8940d42fb54e
SHA2560966e86fffa5be52d3d9e7b89dd674d98a03eed0a454fbaf7c1bd9493bd9d874
SHA512d5effbfa105bcd615e56ef983075c9ef0f52bcfdbefa3ce8cea9550f25b859e48b32f2ec9aa7a305c6611a3be5e0cde0d269588d9c2897ca987359b77213331d
-
Filesize
102KB
MD50fd8bc4f0f2e37feb1efc474d037af55
SHA1add8fface4c1936787eb4bffe4ea944a13467d53
SHA2561e31ef3145d1e30b31107b7afc4a61011ebca99550dce65f945c2ea4ccac714b
SHA51229de5832db5b43fdc99bb7ea32a7359441d6cf5c05561dd0a6960b33078471e4740ee08ffbd97a5ced4b7dd9cc98fad6add43edb4418bf719f90f83c58188149
-
Filesize
212B
MD57ce5de8779412b7fdd4a53bf0f43f01c
SHA121d29b7d931d786cea6befb40f45838c2214d99b
SHA256e28c87adc74786bca5100981bc241205a1f25f90bfe126ef9863e33f150e5ee3
SHA5123b25acc2bb3ad123c87b2a077e62616acafb9c33beecde4e64076b55e8783580045967f218aaa41d054a0d7bc3b845d1820d16c9b2a2bc9dc108ff48c58e239b