Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe
Resource
win7-20240708-en
General
-
Target
2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe
-
Size
1.2MB
-
MD5
9554b1bd8310387ca2622f7b2f19a3fc
-
SHA1
5252a01bf06ee27f83e2f1cda4472bba740181c3
-
SHA256
161b5a9456c3bdbe892fffec5293d0b44c6dbe34e120e32d06f9d209912a22bf
-
SHA512
16f38ef7866fdbd69d9a72da9c4a4af57e535b8b609955dd1ff05582313084e0a2ee7f1add135fd3e2f3b01e4a0d7a8bb49e1faca5fc02525b066b3f97f6e655
-
SSDEEP
24576:Bvt509XOA2NMW8NJiJ9A99JK45yWl8pHu1FxU5A2qH:BvY9XORNMW8NYJejJLzIu1FxZ2y
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 2 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/3048-12-0x00000000002C0000-0x00000000002C9000-memory.dmp family_bdaejec_backdoor behavioral1/memory/3048-332-0x00000000002C0000-0x00000000002C9000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x000a0000000120d5-11.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 3048 yBb.exe -
Loads dropped DLL 27 IoCs
pid Process 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe yBb.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe yBb.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe yBb.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe yBb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE yBb.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe yBb.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe yBb.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe yBb.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe yBb.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe yBb.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe yBb.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe yBb.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe yBb.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe yBb.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe yBb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE yBb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE yBb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE yBb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE yBb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE yBb.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe yBb.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe yBb.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe yBb.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe yBb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE yBb.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe yBb.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe yBb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE yBb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe yBb.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe yBb.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe yBb.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe yBb.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe yBb.exe File opened for modification C:\Program Files\Windows Mail\wab.exe yBb.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe yBb.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe yBb.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe yBb.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe yBb.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe yBb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe yBb.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe yBb.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe yBb.exe File opened for modification C:\Program Files\SelectCheckpoint.exe yBb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yBb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3032 wrote to memory of 3048 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 30 PID 3032 wrote to memory of 3048 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 30 PID 3032 wrote to memory of 3048 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 30 PID 3032 wrote to memory of 3048 3032 2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe 30 PID 3048 wrote to memory of 1660 3048 yBb.exe 32 PID 3048 wrote to memory of 1660 3048 yBb.exe 32 PID 3048 wrote to memory of 1660 3048 yBb.exe 32 PID 3048 wrote to memory of 1660 3048 yBb.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-26_9554b1bd8310387ca2622f7b2f19a3fc_mafia_wapomi.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\yBb.exeC:\Users\Admin\AppData\Local\Temp\yBb.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\12665c18.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD57424e592a15998ad29e91d2ab42367dd
SHA144bb85c25ecf3a7b95449f99493ac40f0f1e2fc8
SHA2568f8375f68ab16752d0a5a070e116a4fba7d0fb8dbb14e5ce2c8c62f720651453
SHA5125e17df516548926cddafd5bc6cc1c36a771c39561235c5ae65e7168dbbdd78ed5007bdd505c7a95f882c241b120819929979ccbc9e64064985f6e85bb9e37603
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
1KB
MD5626e2af9f42a7750eeea89a1870f616f
SHA122f23d7172dfdbc20cc854a2590695ab2c8bab4e
SHA25663c74d3c5ae0ea3224a0de5817f50f9fb23b195b6cc5ea0e3e39927f39aea94b
SHA512912cbae180bdc9d5f6f0d0f2ad8c92b153b1ca749a7ae267daf8d31f7517b5f485d86d5eb8ce5dd65c74329f85231ba321c128914f29aaa6295074e0ddb1700b
-
Filesize
5KB
MD5760fc24bb6078fd1ddc8a976aa4103a4
SHA1528ca98dd4b94582929daed35bd291dcf2a8f67f
SHA25655df22cd6160fdf4733c1f22bfad151eecc338af244c07f61b5d6accc5bdeb12
SHA51201686b5a3e3844a17a51a924cabe88db2368a8e6870f5e1a82c72bac8b7099de6ddaa513f05b31cd8339a594a8605f1e37705de9a4a61fb04627ef62a836c6fb
-
Filesize
12KB
MD5d14b422803e3f5975054fb1f5508264c
SHA1d5dc8950650149ec87ec643a6d1031f1c723d64e
SHA25661412c4d960a1d48d7e7b27ce756db29ac2bd3c1d71de375553b0d4c111b10ae
SHA512ff9e52d356b173ab7b204e51d75d7e420a9aba1def4df172fbbfdef44e665b217ad366556e3d05958054d3432dd55e1311783999ea5453163e695f0420cc3e3b
-
Filesize
13KB
MD54385da8b81c7ad2ad4c455e7658342a6
SHA16dccb663ae44ef793e3ca0592150031c0fd49a05
SHA2568c22b9369c8f440a474d9abf2b466c2d46d097c902ef6b6261c3a9fdfb73d5a4
SHA512a59b71f46c7687ebbf018a27f7cf2def97bfda5f8ff936bdb2d49fe0496ab0fda35788b8076b409589c4c4e76ec66dd83b681b2f1522022e16903dd1648eeb90
-
Filesize
13KB
MD5a4d0f72f4317851580ffd2cb409696e5
SHA107a60096bcab6589a8ba69bca7c82c331dff15d7
SHA25679d4c2d12b81f103c4b73d5a40c353154b37d7291485de0e9e0a9f39d28deb3f
SHA512750a56fa7641dd0bac0154199b0420a3e672a9d6447f0227d5bd2f5b4d8c73d0e193040066e6ae160661cefca3cc6e1707e1aa3ccd342e72836d8f1b0888ac83
-
Filesize
14KB
MD54658cc2f74a6c21f8fd70c7f720669c9
SHA15e1d882d78a393051afea79ed5d3333266f93fc0
SHA256e2c574ae026136b984c8f6cd3d01c3cc59dc1ef12a4d6e825930dad0c591bc2d
SHA512006226c744a46b45200ba4219aa83844d786214c2898f94966693409f502a2f24cf0f3bed04feb3a49ad4013dbe3acf2534373631babdb0640f7b6e605045ed7
-
Filesize
15KB
MD50ff0c5ad0782382eab28349076d50ec2
SHA140bb123e4200cadeb66ec1d0616abd1a595deea6
SHA2563c8f5ee456912f9e669c8969ef39fc21383fc0d37495bc37f75e663035bdf94b
SHA512f773ec836ed8c7c3f8a6166d4273738313130bd023ffc02042ebb351c65129cb61fe4a8edc4fabac394041e09e2736ddf7304fafa10979b472b07659f9901460
-
Filesize
13KB
MD558910aa05b681654f9f8845bce95ddf8
SHA165dc55b16489d5b50c13e54c38cb1ffb96caa3b3
SHA2564e35b772f1b9db0d0aee90d666005b66089f70cf907d1ba0a748101f1add7467
SHA51286f2fba4fb44030897da508507b76327410efd541deee9f0dcce0fc95105d1178f346a972101fd6a39dd595336c6389c641ffe519e1cc925559d7abea418ee5c
-
Filesize
14KB
MD50dbe9ffb70ee92cfe9c1c6ba8eaa2141
SHA1fae0203cab2bebb02837ad3173ae5295a208b5e5
SHA256ec5b23920cdd4d88b39013d2d98a39022b3ec82b7a8ca4530cfbe4fdf5b9c49e
SHA51249e87d871d91c48890639698b94112984f8c5b6f4b9e924b8abe0972dbafbf57d66044923f93b33c0685f5a9db42e1b76bdfb12f430547e0ad80e6471b2ab984
-
Filesize
13KB
MD55b38592c724a5e72d87990efce29fd23
SHA1dff56f792bcea6f914f03ef0a4abab9bc5c6a7dc
SHA25694983069f88d7e0d1d26872adf7d91aa32811947591ab4cddae0213dbda9433e
SHA512df3b40672db153a042d6ec0506c4788a273194cae07356ce565d3449166c5cfcf67952fde3da27c742f5aeab9108fd92f41fc8f6fc6dc4829d292352d9494c5e
-
Filesize
15KB
MD5fcefb428ce12daad86ac90993a2a7dd8
SHA149e535865ab8c26007dc6ecd15ad5133e54dd054
SHA256c89a988e49d346509dd8531f9888ead6ddf28f9ebed0d96faf91205dec04a887
SHA5121cb564df378d2e9a94a1c43231b2c2f0c98e698c43f03ad82eba372a0514e4363edd6d92b6cd4d5984aee230b3496145c16b54c7c1dfd21d829199a161da8a83
-
Filesize
11KB
MD5f5d43290fbd4a2da0bd14b2d93c9a963
SHA13188281bd12f89b02bd33747f0a67f4a493a2856
SHA256b83c5b9adc55a15f46cd150f92d868dfba7feaba2abc1bdffdd3f3019e19ea67
SHA5126d41294618518f0730ef36a3f16c7b798b470d2a0e6969e031c954471e8d0c5bd8e956c197d9176c09cad8730f2710769c5d6ceb7314d362eac955f9f3a76fff
-
Filesize
14KB
MD5b8512dd657fc422f90e2c0d9ad3b63d1
SHA1348cba7698120f58520c5392d19a120662ac6c19
SHA256a10665e6d54cbc5219f0ccc5794ce3e11e3bc2fac3171b5f07a59405099a8773
SHA51266e8a2a30b8ba27ba9aef953a53dfad80ad5f0401eb7255bac50114c88d47a15083285a2fb221b2d5ec929e4457ab95b7787466a2650c64fe3858cfb6c302fdc
-
Filesize
14KB
MD5d2260f12a8a5d5f37cea9b69f40f471f
SHA12e0bcae5538fa26a26a4552045025fd4677896ff
SHA2562311e7a2811cca154dc723925708d7980a729a446aa02496b84a1eb7f1609738
SHA5126f051273d5fbf1411af76c718bdf9dbe793b890e9145b87f9f5562daa27c701355c79bec9b4868e5bcf3ab95ddf15aefe4bc54d6bbef4514c7fff282f951f01c
-
Filesize
10KB
MD5a08d1e79297ca62a1dcc00ad3c45688e
SHA1f956846a64954555339db45ab0d7edb0a797f98d
SHA256844727deac51c9daa08f7831ab60de68f7460b8c04817cef43069514750a8505
SHA5121165f426c609b3266b526665800ff1ab49f04887bb96bbfc841973ceabd858ee2ec9c2332ee3d1cd8574f7706c79ec5902abcacc37ac7d91177e8eee3761d70d
-
Filesize
9KB
MD59a12717e093044758d3a93f3886e940f
SHA169c1bee4144ddff0d86a4ffe2cbb32ae601bd0a7
SHA2563b8b98b9af4c67d38efcce8dfa0fdb7d97e8434cfe06b31f96d4fccc2576a9c3
SHA5125bc75871c3c8d9fbc783cfa18a9a827deb4853bec3345afa7f2a6820f218e4a73a20896882d66481271f48d52f9834e48a099de650d61237cf03e28462c78bdd
-
Filesize
13KB
MD523f4981b0186581f43683b3099d0c75d
SHA1d40aac72b7a52c25537c3eaa4eb53fd58aa96667
SHA256a9f90da2fcd35521b2cebc968c54eeed69da1bbaad3900ed80f6b41324e1417b
SHA5125520f8b9ea642c5209d44d77bcae0f63e264496f3fdb6f0c8c5b7737a409de803080663092a877d9b272db5438a89355f129b7b5664c80545cab14ecc3f37354
-
Filesize
14KB
MD507019c6cf08c17695a80077b945b7269
SHA1f317566c8b2bffd8c2cbbe15eb10907960d20031
SHA256bffa2b853fb25f4905ea25bba4ed63aebe2e33ca2b6a195f4e3f81a3cee264eb
SHA512da078d2a157e09af586f66bba3a2258519ebe5d9c82ce03fac5b86657171757852dce776c94138fc3bf43f0a911e4fff2587ab217d0a8ab010f793bbcb4d2d1d
-
Filesize
14KB
MD57ab7e6c42dbcabe8e6aba062d34ae0b9
SHA13797603d20ac972916edf4504159ab3d54b674d6
SHA256b66f0d8b0031bbdd9b17cbf6d325396281354406190a741a6a353a3fad644975
SHA51203ed0c08835af1118ff9aade0e293ea326489caa48962e51c5d0b5a96bd8fec94a8ffdc01cf18f3b071a3957981bd5b4a70d2bd640060e513227b05452856f72
-
Filesize
14KB
MD512d4e0c79a907129cf72b30bddf9da04
SHA1f77eececfa10a29a5156e8e3deb8fe6bb8f0fc5c
SHA25671318363ee8bee5264eb9b7798c007944abfb3c320e96afa40404e9a33a7c89f
SHA512c3a51c0a99ef27dfc9478b8b567e124de13da9f6cc5db8e7ce4367fb0b46e294573db2240ec26e6d2fcc41e7605a02b4d38e5343e74162dab4b250873288b13d
-
Filesize
14KB
MD58fbe6456820d952c43d22cdc854e44f8
SHA1f9dd0c8ebb33f97e7fada4e3bbb0fdaf0b53d6e5
SHA2561e93d7edff843854741eb93c9b2c52792ba6cc133692afbdc8e894a6d51ae84c
SHA512b5674115b6755ec855564b7c91bb9d9a23510ef4e6ce537537fa334343fbaebbef44e0151eee766895d269bfb70a9acba9d0efbb5850a43715371801667dc66a
-
Filesize
13KB
MD5ea387e6ce9d2b6980977b5149af80fe4
SHA1223a22e148ce5a09aec19d4f8ade45e934e537cb
SHA25675cfc99c9af161e5049f97b3783c906b34a13470544c22fb2435367b1c38209e
SHA5128e74165789d93c47b9e3a8b2f2caa1da8a3454682a435fb9e8f33a2ce419aa8412925c296eb45f42ddeff975716d87162dae4e3123d363a4f0ce7f5196adb2d2
-
Filesize
13KB
MD5e845328d501dee795253da63b65ef726
SHA163f34827dfa86c1c9471be9c3b9a451ea9f20607
SHA256fb27ec1044dce6256c0782d8df2ddf21557604dc14f7e428455a727ea7af746b
SHA5125bcb80eebff9606db6da1551220ec996f71f881e219e8b27ce8f414e323ec5139337808f30fa5ed3b35c253f3932bb95106c3e7b663a58687e91c8d784469da4
-
Filesize
12KB
MD58f5ce4eefe667cd884a10181a97e8d1f
SHA12be6239f5c9177db4320d46753e64ff877a2f0f0
SHA25655553ad17868d3bd51b627b77c4b2c2832bcc558f8555b77de06534c22c4e164
SHA512ed77b3a75a8e019b27e0eafa409419cdabf7f1b992cceca9cdbded6ffa9cdfce60c58a3cfdadc82115138179c446d50adc335d69dd9ba43a8782f9cdc69500d6
-
Filesize
13KB
MD50baa06a05026a2af3e895c65f3b8eaac
SHA1a1c649c0d25f53500fc12ef47b89b2827bacfe80
SHA2564b3638de537067970e3df240a9717471114b2134ebc3f4540389d982f48b9af2
SHA512b41f1d9df5a0f8c6f0508249b6159ca2a20099622e67aa0452ef80b3952ab91ef89971ed32ddf8247d24e1f84117b9dc59dd04e768e6f60c981312e0807c8a8e
-
Filesize
8KB
MD5ddb98731bff79ffb5cefba58a0c64926
SHA12bc92c1f5265bcd0d88b0ea4561988656dfa0537
SHA256093f7a0f5f721fd68724cc17b8d307252b4b2d6ff841d6733e5c91ffdecdafe1
SHA512dce39698c345e34f49be6e34d548035916cd0d9a854601efcd31d6a51aa477b6ff7044dcb5b1084a123ab0bee0d89d6867899de15c7c871c0e1cb6201091a8a1
-
Filesize
8KB
MD5a54080759bd182e3b5b3716443d523ab
SHA17935dacd57509aa7e1c0c7f4f9f647ccd4b19cba
SHA2568a83edd1fed8ed6bfa56c4b623446429222abc4ca85009c015cbc302d20771cc
SHA5122f077eab31462f995d1c7f7c80117fb86f292da9a0836f5e45932dc93ffce9da6a9b7006c3cf4760345b78b94c3e3a2ea7ce7a00908a2b853ecddfc1220853fa