Analysis
-
max time kernel
59s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2024 20:58
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023c7f-106.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe -
Executes dropped EXE 2 IoCs
pid Process 4712 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe 2580 DPBJ.exe -
Loads dropped DLL 1 IoCs
pid Process 4712 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 raw.githubusercontent.com 10 raw.githubusercontent.com -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\DPBJ.exe ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe File created C:\Windows\SysWOW64\28463\key.bin ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe File created C:\Windows\SysWOW64\28463\AKV.exe ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe File created C:\Windows\SysWOW64\28463\DPBJ.001 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe File created C:\Windows\SysWOW64\28463\DPBJ.006 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe File created C:\Windows\SysWOW64\28463\DPBJ.007 ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPBJ.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3700 msedge.exe 3700 msedge.exe 4456 msedge.exe 4456 msedge.exe 1508 identity_helper.exe 1508 identity_helper.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 5796 7zG.exe Token: 35 5796 7zG.exe Token: SeSecurityPrivilege 5796 7zG.exe Token: SeSecurityPrivilege 5796 7zG.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 5796 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4456 wrote to memory of 5052 4456 msedge.exe 85 PID 4456 wrote to memory of 5052 4456 msedge.exe 85 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3048 4456 msedge.exe 86 PID 4456 wrote to memory of 3700 4456 msedge.exe 87 PID 4456 wrote to memory of 3700 4456 msedge.exe 87 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88 PID 4456 wrote to memory of 2608 4456 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://raw.githubusercontent.com/ytisf/theZoo/refs/heads/master/malware/Binaries/Keylogger.Ardamax/Keylogger.Ardamax.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6d6546f8,0x7ffb6d654708,0x7ffb6d6547182⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4876 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13846250431643129880,4373101484035504927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:1428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4760
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5716
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Keylogger.Ardamax\" -ad -an -ai#7zMap30849:96:7zEvent232461⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5796
-
C:\Users\Admin\Downloads\Keylogger.Ardamax\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe"C:\Users\Admin\Downloads\Keylogger.Ardamax\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4712 -
C:\Windows\SysWOW64\28463\DPBJ.exe"C:\Windows\system32\28463\DPBJ.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
193B
MD562fc8758c85fb0d08cd24eeddafeda2c
SHA1320fc202790b0ca6f65ff67e9397440c7d97eb20
SHA256ee0d15dce841e092ad1a2d4346a612410f8f950fdb019bc7b768f6346f2b5248
SHA512ca97e615bdcac137a936c10104a702e1529ed3470828f2c3a2f783345ebbef04cac8c051df636c714151671efea53a9b8912b6b0d0b5eafdac5fae1dfdc8f85d
-
Filesize
5KB
MD56c9d7403cb0d0956f1e6b4114cc74683
SHA13196938592d635e9ee9ea19a9b3239f1b91e0dbf
SHA2567b82015eeb3d960ef8436ac2ef6a82e79dd899252b35eabf1c17df60ce95511e
SHA512904e09d84b79d3f5e45528bed41b71082411a4b9d6be1adc217c57d4beb2a132acb61bb8acc6a80c6b1078cf0bb686fffe1fcecde59efc9b2466e02cf2f68eb2
-
Filesize
6KB
MD5f62bb79174a0c2125e0ce61e69098ffd
SHA1ab2f7ee967152dc34c6465c129fb9826d867b109
SHA2565c1171468d98adaee01db2fa00b06c09ac71d9a21f1245fc3e49d09a5580d46f
SHA512656918368c29f4067008d98cb002706dcd1199867d0f03e16f1f4705dd513bb55b4e7e2ca682dd7bb4e15d490c988c2e01400b9b1d24e6499cbb942c63d7c3c1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5548293ad413404d7cfa8ffe577996408
SHA104bc0db3dd85388387636cbdac8f99d42326a2fa
SHA25616b6e5e559499318d5554cc7ade3eba283bc02c8523096857666a11906bda08c
SHA5123019b9b213de79edb4048736225608beec22e3d82f8576487faa7882a08938eb1924a408bef2eeb5777978fcba0604c26a845989f47f10895a5ff2290262a2a0
-
Filesize
11KB
MD5e7d2ce52825d2b28e080f89978753655
SHA199b14c38c712187fa5c851ffdd8da3f909f39ad2
SHA256fd15094312e47b40b0036a5cd3c0763cea365aa6987e2267f1b03a0ecdaadb37
SHA5129293cd74e1c112e65383b22913b28f940f53ecb108e1931457b4a427dcf9b281cba13d60414fb85859e2f2ba94ec0128f8de2fe6ba94afd5a483b73284372687
-
Filesize
4KB
MD5d73d89b1ea433724795b3d2b524f596c
SHA1213514f48ece9f074266b122ee2d06e842871c8c
SHA2568aef975a94c800d0e3e4929999d05861868a7129b766315c02a48a122e3455d6
SHA5128b73be757ad3e0f2b29c0b130918e8f257375f9f3bf7b9609bac24b17369de2812341651547546af238936d70f38f050d6984afd16d47b467bcbba4992e42f41
-
Filesize
778KB
MD55de75a478ffb3aa01a88f4e539f3edc0
SHA1d4dbbdd4a8888b6b0738471e2e422c26f7e2f81b
SHA2569c662e2c950e9cba8367a47f628553291f1e26b7e897a8533c00a4b27e174227
SHA51205f2bcdfb298f294f58fc59709986f73c48d6d6d2b4b21dc8307c8dde57b5a5b632ab6e00af43457b30182fb8a5351239c3636231244dec10c45d4c7b62f5d70
-
Filesize
783KB
MD5e33af9e602cbb7ac3634c2608150dd18
SHA18f6ec9bc137822bc1ddf439c35fedc3b847ce3fe
SHA2568c870eec48bc4ea1aca1f0c63c8a82aaadaf837f197708a7f0321238da8b6b75
SHA5122ae5003e64b525049535ebd5c42a9d1f6d76052cccaa623026758aabe5b1d1b5781ca91c727f3ecb9ac30b829b8ce56f11b177f220330c704915b19b37f8f418
-
Filesize
457KB
MD597eee85d1aebf93d5d9400cb4e9c771b
SHA126fa2bf5fce2d86b891ac0741a6999bff31397de
SHA25630df6c8cbd255011d80fa6e959179d47c458bc4c4d9e78c4cf571aa611cd7d24
SHA5128cecc533c07c91c67b93a7ae46102a0aae7f4d3d88d04c250231f0bcd8e1f173daf06e94b5253a66db3f2a052c51e62154554368929294178d2b3597c1cca7e6
-
Filesize
492B
MD57a0f1fa20fd40c047b07379da5290f2b
SHA1e0fb8305de6b661a747d849edb77d95959186fca
SHA256b0ad9e9d3d51e8434cc466bec16e2b94fc2d03bab03b48ccf57db86ae8e2c9b6
SHA512bb5b3138b863811a8b9dcba079ac8a2828dae73943a1cc1d107d27faca509fda9f03409db7c23d5d70b48d299146de14b656314a24b854f3ae4fdb6ef6770346
-
Filesize
8KB
MD535b24c473bdcdb4411e326c6c437e8ed
SHA1ec1055365bc2a66e52de2d66d24d742863c1ce3d
SHA2564530fcc91e4d0697a64f5e24d70e2b327f0acab1a9013102ff04236841c5a617
SHA51232722f1484013bbc9c1b41b3fdaf5cd244ec67facaa2232be0e90455719d664d65cae1cd670adf5c40c67f568122d910b30e3e50f7cc06b0350a6a2d34d371de
-
Filesize
5KB
MD5a8e19de6669e831956049685225058a8
SHA16d2546d49d92b18591ad4fedbc92626686e7e979
SHA25634856528d8b7e31caa83f350bc4dbc861120dc2da822a9eb896b773bc7e1f564
SHA5125c407d4aa5731bd62c2a1756127f794382dc5e2b214298acfa68698c709fbbe3f2aa8dbdcbef02ed2a49f8f35969959946e9f727895bdca4500d16e84f4ef2e8
-
Filesize
807KB
MD530222bb1cd6720a63a455cfe9ea96299
SHA1aa5b9eff73bd07980078d04e013d368ba1588d13
SHA25666c441e9e9177b2d745962b9ffe7db7c352ddb53aec351b8c34871cba067cecf
SHA51280daee7beee15940195789befa69ed08dc2e5629800e65fcf8dd0b5c8080217b9a217e73b7c436bfbabda411b8c51fb8a700557e73475e1b003adc8f616dd51b
-
Filesize
646KB
MD5b863a9ac3bcdcde2fd7408944d5bf976
SHA14bd106cd9aefdf2b51f91079760855e04f73f3b0
SHA2560fe8e3cd44a89c15dec75ff2949bac1a96e1ea7e0040f74df3230569ac9e37b0
SHA5124b30c3b119c1e7b2747d2745b2b79c61669a33b84520b88ab54257793e3ed6e76378dea2b8ff048cb1822187ffdc20e921d658bb5b0482c23cfa7d70f4e7aa1a
-
Filesize
79KB
MD52b56970e1bc20f9b1815b38584ae0bfd
SHA1cf7f86159d7fb563ed550ab1c63a8c5777c54777
SHA2562b56aaa4350bdebd6f07988da53e0cc93ce817237c4a6d8b71eaffd5eea4e74b
SHA5121dd5584488c11316426add1e7a4bc1344b3c07fc5578b9cf4191b281d4871acb97825787c926984b3843c81917e8442645ade80511c42accc37c2baad84c8170
-
Filesize
106B
MD5639d75ab6799987dff4f0cf79fa70c76
SHA1be2678476d07f78bb81e8813c9ee2bfff7cc7efb
SHA256fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98
SHA5124b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2