Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/12/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe
Resource
win7-20240903-en
General
-
Target
2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe
-
Size
16.8MB
-
MD5
b665fc48ad4d0dfa56ab72fe72c40875
-
SHA1
b8143baa1616ef1a08f9c7e74c8dbec480347ef4
-
SHA256
5618fdd3398e3ec06afb198feb4df844125c6537e48d6b22f5ea6f9d6d749e22
-
SHA512
ff9176cb6ce0c15f143a210be7bd35e5c40a3d823c6b1bf95838198f35738327795b806150304d58e3616f2a042b324ec705fc0682313c795fa04271747eaadb
-
SSDEEP
393216:H8jzneFnE8qU6GOjQoxasPp8qgSmIbr/Asb8nmF:HeLkKlkdIb8sYm
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 2 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/2204-11-0x0000000000260000-0x0000000000269000-memory.dmp family_bdaejec_backdoor behavioral1/memory/2204-215-0x0000000000260000-0x0000000000269000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x0007000000012118-7.dat aspack_v212_v242 -
Executes dropped EXE 5 IoCs
pid Process 2204 djYgu.exe 2716 vcredist_x64(ENG).exe 684 Setup.exe 2708 Samsung EHDD SecretZone.exe 2012 Samsung EHDD SecretZone.exe -
Loads dropped DLL 23 IoCs
pid Process 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 2716 vcredist_x64(ENG).exe 684 Setup.exe 684 Setup.exe 684 Setup.exe 684 Setup.exe 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 2708 Samsung EHDD SecretZone.exe 2708 Samsung EHDD SecretZone.exe 2708 Samsung EHDD SecretZone.exe 2708 Samsung EHDD SecretZone.exe 2708 Samsung EHDD SecretZone.exe 2708 Samsung EHDD SecretZone.exe 2012 Samsung EHDD SecretZone.exe 2012 Samsung EHDD SecretZone.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\mfc100u.dll 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe File opened for modification C:\Windows\SysWOW64\mfc100u.dll 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe File created C:\Windows\SysWOW64\msvcr100.dll 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe File opened for modification C:\Windows\SysWOW64\msvcr100.dll 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe djYgu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe djYgu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE djYgu.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe djYgu.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe djYgu.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe djYgu.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe djYgu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE djYgu.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe djYgu.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe djYgu.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe djYgu.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe djYgu.exe File opened for modification C:\Program Files\7-Zip\7zG.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe djYgu.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe djYgu.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe djYgu.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe djYgu.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe djYgu.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe djYgu.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe djYgu.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe djYgu.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe djYgu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE djYgu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE djYgu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE djYgu.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe djYgu.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe djYgu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe djYgu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe djYgu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE djYgu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE djYgu.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe djYgu.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe djYgu.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe djYgu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe djYgu.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe djYgu.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{9DFE08CC-30AD-4427-BBD2-AE53EED44C59}\chrome_installer.exe djYgu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE djYgu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe djYgu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe djYgu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Samsung EHDD SecretZone.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Samsung EHDD SecretZone.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djYgu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcredist_x64(ENG).exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 684 Setup.exe 684 Setup.exe 684 Setup.exe 684 Setup.exe 2708 Samsung EHDD SecretZone.exe 2708 Samsung EHDD SecretZone.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 476 Process not Found 476 Process not Found -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 2708 Samsung EHDD SecretZone.exe 2012 Samsung EHDD SecretZone.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2204 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 30 PID 1924 wrote to memory of 2204 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 30 PID 1924 wrote to memory of 2204 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 30 PID 1924 wrote to memory of 2204 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 30 PID 1924 wrote to memory of 2716 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 31 PID 1924 wrote to memory of 2716 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 31 PID 1924 wrote to memory of 2716 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 31 PID 1924 wrote to memory of 2716 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 31 PID 1924 wrote to memory of 2716 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 31 PID 1924 wrote to memory of 2716 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 31 PID 1924 wrote to memory of 2716 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 31 PID 2716 wrote to memory of 684 2716 vcredist_x64(ENG).exe 32 PID 2716 wrote to memory of 684 2716 vcredist_x64(ENG).exe 32 PID 2716 wrote to memory of 684 2716 vcredist_x64(ENG).exe 32 PID 2716 wrote to memory of 684 2716 vcredist_x64(ENG).exe 32 PID 2716 wrote to memory of 684 2716 vcredist_x64(ENG).exe 32 PID 2716 wrote to memory of 684 2716 vcredist_x64(ENG).exe 32 PID 2716 wrote to memory of 684 2716 vcredist_x64(ENG).exe 32 PID 1924 wrote to memory of 2708 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 33 PID 1924 wrote to memory of 2708 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 33 PID 1924 wrote to memory of 2708 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 33 PID 1924 wrote to memory of 2708 1924 2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe 33 PID 2708 wrote to memory of 2012 2708 Samsung EHDD SecretZone.exe 34 PID 2708 wrote to memory of 2012 2708 Samsung EHDD SecretZone.exe 34 PID 2708 wrote to memory of 2012 2708 Samsung EHDD SecretZone.exe 34 PID 2708 wrote to memory of 2012 2708 Samsung EHDD SecretZone.exe 34 PID 2204 wrote to memory of 2764 2204 djYgu.exe 38 PID 2204 wrote to memory of 2764 2204 djYgu.exe 38 PID 2204 wrote to memory of 2764 2204 djYgu.exe 38 PID 2204 wrote to memory of 2764 2204 djYgu.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-01_b665fc48ad4d0dfa56ab72fe72c40875_icedid_magniber_wapomi.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\djYgu.exeC:\Users\Admin\AppData\Local\Temp\djYgu.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\4e9b1031.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
C:\Users\Admin\AppData\Local\Clarus\vcredist_x64(ENG).exe"C:\Users\Admin\AppData\Local\Clarus\vcredist_x64(ENG).exe" Setup /passive /promptrestart2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\4981e2168c1e303a382c\Setup.exec:\4981e2168c1e303a382c\Setup.exe Setup /passive /promptrestart3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
-
C:\Users\Admin\AppData\Local\Clarus\Samsung EHDD SecretZone.exe"C:\Users\Admin\AppData\Local\Clarus\Samsung EHDD SecretZone.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Samsung EHDD SecretZone.exe"C:\Users\Admin\AppData\Local\Temp\Samsung EHDD SecretZone.exe" C3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2012
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185B
MD5f5bf86b95d9c7b58428e3dea75206d85
SHA1ffb6469fc37cae4aa4364ce628f40e5c0cd7d1c1
SHA256fbaf22cc83ae943735a42745f6c62f52b4f24e4960304494b1c097d166785f30
SHA512c2fc0fc37ab73bac950f8a772a839b2ec495afe44bd0106b8cba689d0d959e8110e0a0ea4568d6094017e4ce3bc9db2d9cd7ca5befc07f797e5309333f1de534
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
4.2MB
MD5f3de10aabd5c7a1a186c9966f037d0c0
SHA16aaae8331a5377f4025d2d860e5872b842a41df8
SHA256bc50848aeef466dff4a3d8c386bf0d0ec35b8e5b438031ae885aa5371f2e1a42
SHA51207d93b8abbf8acfab1d8f0711a37086764000310450ba361e7d5e1369012b3a45fd394460841b0f3cca79acead2080bbe1f029bc36191c133d7ccea182ca84e1
-
Filesize
76KB
MD5006f8a615020a4a17f5e63801485df46
SHA178c82a80ebf9c8bf0c996dd8bc26087679f77fea
SHA256d273460aa4d42f0b5764383e2ab852ab9af6fecb3ed866f1783869f2f155d8be
SHA512c603ed6f3611eb7049a43a190ed223445a9f7bd5651100a825917198b50c70011e950fa968d3019439afa0a416752517b1c181ee9445e02da3904f4e4b73ce76
-
Filesize
141KB
MD53f0363b40376047eff6a9b97d633b750
SHA14eaf6650eca5ce931ee771181b04263c536a948b
SHA256bd6395a58f55a8b1f4063e813ce7438f695b9b086bb965d8ac44e7a97d35a93c
SHA512537be86e2f171e0b2b9f462ac7f62c4342beb5d00b68451228f28677d26a525014758672466ad15ed1fd073be38142dae478df67718908eae9e6266359e1f9e8
-
Filesize
29KB
MD512df3535e4c4ef95a8cb03fd509b5874
SHA190b1f87ba02c1c89c159ebf0e1e700892b85dc39
SHA2561c8132747dc33ccdb02345cbe706e65089a88fe32cf040684ca0d72bb9105119
SHA512c6c8887e7023c4c1cbf849eebd17b6ad68fc14607d1c32c0d384f951e07bfaf6b61e0639f4e5978c9e3e1d52ef8a383b62622018a26fa4066eb620f584030808
-
Filesize
40KB
MD5b13ff959adc5c3e9c4ba4c4a76244464
SHA14df793626f41b92a5bc7c54757658ce30fdaeeb1
SHA25644945bc0ba4be653d07f53e736557c51164224c8ec4e4672dfae1280260ba73b
SHA512de78542d3bbc4c46871a8afb50fb408a59a76f6ed67e8be3cba8ba41724ea08df36400e233551b329277a7a0fe6168c5556abe9d9a735f41b29a941250bfc4d6
-
Filesize
38KB
MD55486ff60b072102ee3231fd743b290a1
SHA1d8d8a1d6bf6adf1095158b3c9b0a296a037632d0
SHA2565ca3ecaa12ca56f955d403ca93c4cb36a7d3dcdea779fc9bdaa0cdd429dab706
SHA512ae240eaac32edb18fd76982fc01e03bd9c8e40a9ec1b9c42d7ebd225570b7517949e045942dbb9e40e620aa9dcc9fbe0182c6cf207ac0a44d7358ad33ba81472
-
Filesize
16KB
MD59547d24ac04b4d0d1dbf84f74f54faf7
SHA171af6001c931c3de7c98ddc337d89ab133fe48bb
SHA25636d0159ed1a7d88000737e920375868765c0a1dd6f5a5acbb79cf7d97d9e7a34
SHA5128b6048f4185a711567679e2de4789407077ce5bfe72102d3cb1f23051b8d3e6bfd5886c801d85b4e62f467dd12da1c79026a4bc20b17f54c693b2f24e499d40f
-
Filesize
40KB
MD54ce519f7e9754ec03768edeedaeed926
SHA1213ae458992bf2c5a255991441653c5141f41b89
SHA256bc4ca5ad609f0dd961263715e1f824524c43e73b744e55f90c703b759cae4d31
SHA5128f2ff08a234d8e2e6ba85de3cd1c19a0b372d9fca4ff0fc1bba7fe7c5a165e933e2af5f93fc587e9230a066b70fb55d9f58256db509cc95a3b31d349f860f510
-
Filesize
39KB
MD5fe6b23186c2d77f7612bf7b1018a9b2a
SHA11528ec7633e998f040d2d4c37ac8a7dc87f99817
SHA25603bbe1a39c6716f07703d20ed7539d8bf13b87870c2c83ddda5445c82953a80a
SHA51240c9c9f3607cab24655593fc4766829516de33f13060be09f5ee65578824ac600cc1c07fe71cdd48bff7f52b447ff37c0d161d755a69ac7db7df118da6db7649
-
Filesize
33KB
MD56f86b79dbf15e810331df2ca77f1043a
SHA1875ed8498c21f396cc96b638911c23858ece5b88
SHA256f0f9dd1a9f164f4d2e73b4d23cc5742da2c39549b9c4db692283839c5313e04f
SHA512ca233a6bf55e253ebf1e8180a326667438e1124f6559054b87021095ef16ffc6b0c87361e0922087be4ca9cabd10828be3b6cc12c4032cb7f2a317fdbd76f818
-
Filesize
32KB
MD5e87ad0b3bf73f3e76500f28e195f7dc0
SHA1716b842f6fbf6c68dc9c4e599c8182bfbb1354dc
SHA25643b351419b73ac266c4b056a9c3a92f6dfa654328163814d17833a837577c070
SHA512d3ea8655d42a2b0938c2189ceeab25c29939c302c2e2205e05d6059afc2a9b2039b21c083a7c17da1ce5eebdc934ff327a452034e2e715e497bcd6239395774c
-
Filesize
39KB
MD51290be72ed991a3a800a6b2a124073b2
SHA1dac09f9f2ccb3b273893b653f822e3dfc556d498
SHA2566ba9a2e4a6a58f5bb792947990e51babd9d5151a7057e1a051cb007fea2eb41c
SHA512c0b8b4421fcb2aabe2c8c8773fd03842e3523bf2b75d6262fd8bd952adc12c06541bdae0219e89f9f9f8d79567a4fe4dff99529366c4a7c5bf66c218431f3217
-
Filesize
30KB
MD5150b5c3d1b452dccbe8f1313fda1b18c
SHA17128b6b9e84d69c415808f1d325dd969b17914cc
SHA2566d4eb9dca1cbcd3c2b39a993133731750b9fdf5988411f4a6da143b9204c01f2
SHA512a45a1f4f19a27558e08939c7f63894ff5754e6840db86b8c8c68d400a36fb23179caff164d8b839898321030469b56446b5a8efc5765096dee5e8a746351e949
-
Filesize
39KB
MD505a95593c61c744759e52caf5e13502e
SHA10054833d8a7a395a832e4c188c4d012301dd4090
SHA2561a3e5e49da88393a71ea00d73fee7570e40edb816b72622e39c7fcd09c95ead1
SHA51200aee4c02f9d6374560f7d2b826503aab332e1c4bc3203f88fe82e905471ec43f92f4af4fc52e46f377e4d297c2be99daf94980df2ce7664c169552800264fd3
-
Filesize
15KB
MD5cd131d41791a543cc6f6ed1ea5bd257c
SHA1f42a2708a0b42a13530d26515274d1fcdbfe8490
SHA256e139af8858fe90127095ac1c4685bcd849437ef0df7c416033554703f5d864bb
SHA512a6ee9af8f8c2c7acd58dd3c42b8d70c55202b382ffc5a93772af7bf7d7740c1162bb6d38a4307b1802294a18eb52032d410e128072af7d4f9d54f415be020c9a
-
Filesize
9KB
MD503e01a43300d94a371458e14d5e41781
SHA1c5ac3cd50fae588ff1c258edae864040a200653c
SHA25619de712560e5a25c5d67348996e7d4f95e8e3db6843086f52cb7209f2098200a
SHA512e271d52264ff979ae429a4053c945d7e7288f41e9fc6c64309f0ab805cec166c825c2273073c4ef9ca5ab33f00802457b17df103a06cbc35c54642d146571bbb
-
Filesize
788KB
MD584c1daf5f30ff99895ecab3a55354bcf
SHA17e25ba36bcc7deed89f3c9568016ddb3156c9c5a
SHA2567a0d281fa802d615ea1207bd2e9ebb98f3b74f9833bba3cb964ba7c7e0fb67fd
SHA512e4fb7e4d39f094463fdcdc4895ab2ea500eb51a32b6909cec80a526bbf34d5c0eb98f47ee256c0f0865bf3169374937f047bf5c4d6762779c8ca3332b4103be3
-
Filesize
288KB
MD5eb881e3dddc84b20bd92abcec444455f
SHA1e2c32b1c86d4f70e39de65e9ebc4f361b24ff4a1
SHA25611565d97287c01d22ad2e46c78d8a822fa3e6524561d4c02dfc87e8d346c44e7
SHA5125750cec73b36a3f19bfb055f880f3b6498a7ae589017333f6272d26f1c72c6f475a3308826268a098372bbb096b43fbd1e06e93eecc0a81046668228bc179a75
-
Filesize
29KB
MD52fadd9e618eff8175f2a6e8b95c0cacc
SHA19ab1710a217d15b192188b19467932d947b0a4f8
SHA256222211e8f512edf97d78bc93e1f271c922d5e91fa899e092b4a096776a704093
SHA512a3a934a8572ff9208d38cf381649bd83de227c44b735489fd2a9dc5a636ead9bb62459c9460ee53f61f0587a494877cd3a3c2611997be563f3137f8236ffc4ca
-
Filesize
13KB
MD5332adf643747297b9bfa9527eaefe084
SHA1670f933d778eca39938a515a39106551185205e9
SHA256e49545feeae22198728ad04236e31e02035af7cc4d68e10cbecffd08669cbeca
SHA512bea95ce35c4c37b4b2e36cc1e81fc297cc4a8e17b93f10423a02b015ddb593064541b5eb7003560fbeee512ed52869a113a6fb439c1133af01f884a0db0344b0
-
Filesize
35KB
MD5812f8d2e53f076366fa3a214bb4cf558
SHA135ae734cfb99bb139906b5f4e8efbf950762f6f0
SHA2560d36a884a8381778bea71f5f9f0fc60cacadebd3f814679cb13414b8e7dbc283
SHA5121dcc3ef8c390ca49fbcd50c02accd8cc5700db3594428e2129f79feb81e4cbbeef1b4a10628b2cd66edf31a69ed39ca2f4e252ad8aa13d2f793fca5b9a1eaf23
-
Filesize
1.4MB
MD5d907a4b180bdb743f61c3681b0ee5898
SHA161150d83c1a5b62a675faca0215d330553ff3237
SHA2565716847dede609b514a8164888858755d78bcdd88ebf97bb06c6ea0fa7a8e509
SHA51297ad9ec3e6775498ede8fab4e75ff098a5ec9ced365a0c8924638593740e2f6870ea8799778b8a910b041d157fde4292dd22d83a4f116274cef9171c21928163
-
Filesize
5.5MB
MD5630d75210b325a280c3352f879297ed5
SHA1b330b760a8f16d5a31c2dc815627f5eb40861008
SHA256b06546ddc8ca1e3d532f3f2593e88a6f49e81b66a9c2051d58508cc97b6a2023
SHA512b6e107fa34764d336c9b59802c858845df9f8661a1beb41436fd638a044580557921e69883ed32737f853e203f0083358f642f3efe0a80fae7932c5e6137331f