Analysis
-
max time kernel
1795s -
max time network
1802s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 19:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe
-
Size
14.9MB
-
MD5
14b4666448134224bfd44d2f6c248872
-
SHA1
4ab14ff17dd9dafabdf3ab131eda4735f85920ee
-
SHA256
5a848fd4e07bf7a3cb43bd6a603f1fe890a90c37d63f54f53b8c8e7948d53242
-
SHA512
18c756db39a72160e3714a69281d86195ed7069e128afce43756c0d3c55d633674cd5b06d782ff7ff0f4c2490b7c992533238cb9178b4536d0f0b3aa802b2548
-
SSDEEP
196608:RWzxiAZQGSVyUxHOmzdUG35rZODxge3Hub7WLvlAXOpKwdou2rTX+0O/:AqGSVRHT2GprZU3eUvhKwdoPX+0A
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/952-55-0x0000000000540000-0x0000000000549000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x000d000000023a9d-2.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation cBxg.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation cBxg.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation cBxg.exe -
Executes dropped EXE 3 IoCs
pid Process 952 cBxg.exe 1900 cBxg.exe 2912 cBxg.exe -
resource yara_rule behavioral1/memory/2332-15-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-11-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-52-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-51-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-50-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-47-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-45-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-43-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-41-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-37-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-35-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-33-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-31-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-30-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-27-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-26-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-23-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-21-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-19-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-9-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-7-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-39-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-18-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-13-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-8-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/2332-54-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/840-79-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/840-87-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/840-83-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/840-81-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/840-80-0x0000000010000000-0x000000001003F000-memory.dmp upx behavioral1/memory/840-85-0x0000000010000000-0x000000001003F000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe cBxg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTEM.EXE cBxg.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe cBxg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe cBxg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe cBxg.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE cBxg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe cBxg.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe cBxg.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe cBxg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe cBxg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE cBxg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.exe cBxg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe cBxg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe cBxg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe cBxg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe cBxg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe cBxg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SELFCERT.EXE cBxg.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe cBxg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\View3D.ResourceResolver.exe cBxg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe cBxg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe cBxg.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{AFD1DC19-D740-4861-ADFA-3BC6A9F6A223}\chrome_installer.exe cBxg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe cBxg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe cBxg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe cBxg.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe cBxg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE cBxg.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxCalendarAppImm.exe cBxg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe cBxg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe cBxg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe cBxg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe cBxg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\IEContentService.exe cBxg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\misc.exe cBxg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\WhatsNew.Store.exe cBxg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\codecpacks.heif.exe cBxg.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe cBxg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe cBxg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\GameBar.exe cBxg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe cBxg.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe cBxg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe cBxg.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE cBxg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Microsoft.MicrosoftSolitaireCollection.exe cBxg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe cBxg.exe File opened for modification C:\Program Files\7-Zip\7z.exe cBxg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe cBxg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe cBxg.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe cBxg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe cBxg.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe cBxg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe cBxg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Win32Bridge.Server.exe cBxg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe cBxg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe cBxg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE cBxg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe cBxg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe cBxg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe cBxg.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe cBxg.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe cBxg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Cortana.exe cBxg.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe cBxg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cBxg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cBxg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cBxg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2332 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 840 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2332 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 840 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2332 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 2332 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 2332 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 840 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 840 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 840 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 4056 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 4056 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 4056 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2332 wrote to memory of 952 2332 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 83 PID 2332 wrote to memory of 952 2332 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 83 PID 2332 wrote to memory of 952 2332 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 83 PID 952 wrote to memory of 2252 952 cBxg.exe 109 PID 952 wrote to memory of 2252 952 cBxg.exe 109 PID 952 wrote to memory of 2252 952 cBxg.exe 109 PID 840 wrote to memory of 1900 840 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 116 PID 840 wrote to memory of 1900 840 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 116 PID 840 wrote to memory of 1900 840 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 116 PID 1900 wrote to memory of 924 1900 cBxg.exe 117 PID 1900 wrote to memory of 924 1900 cBxg.exe 117 PID 1900 wrote to memory of 924 1900 cBxg.exe 117 PID 4056 wrote to memory of 2912 4056 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 120 PID 4056 wrote to memory of 2912 4056 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 120 PID 4056 wrote to memory of 2912 4056 2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe 120 PID 2912 wrote to memory of 4120 2912 cBxg.exe 121 PID 2912 wrote to memory of 4120 2912 cBxg.exe 121 PID 2912 wrote to memory of 4120 2912 cBxg.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\cBxg.exeC:\Users\Admin\AppData\Local\Temp\cBxg.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5e5b0a22.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2252
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\cBxg.exeC:\Users\Admin\AppData\Local\Temp\cBxg.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4e153cf9.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:924
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-15_14b4666448134224bfd44d2f6c248872_icedid_wapomi.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\cBxg.exeC:\Users\Admin\AppData\Local\Temp\cBxg.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\247844ad.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4120
-
-
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\d408e253f94140a4b3697022d69a48ad /t 1936 /p 8401⤵PID:220
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\170853fa53ca4a30817a14c6a9f3497c /t 1936 /p 8401⤵PID:3684
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\b28da2319f7848c09ac3e4bbbe390201 /t 1936 /p 8401⤵PID:4840
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\5940c54266d243d6acf901bbeb1ba0e8 /t 1936 /p 8401⤵PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183B
MD576d9a19be2f6eab0bed499c7a77ac06d
SHA128a6445dae316bbc7868a777563fe16e43fc65ea
SHA256ec193dea698329edcd0214956c09b4847bbada3486e2ee5813922511e3d0f6d5
SHA512a2922466bd65de0fb73da77d259b1cba64fa79506d1a1e159a73af25d63cac49604dd406a4a3ed8a8c5a7e25987dfcaa43a31ce6d11a69a5006befbba8b085ef
-
Filesize
183B
MD55b2cf57e6230eb59dfec244ae48aa5dc
SHA19acc44e6e0d68f77c346db01e0b4acc06d2659d1
SHA256c619e2c99658aef6564249cf0d8373100c81c94b9a263da22a3a2274836474ed
SHA5125ec9bcdbb51896b366ced0485723d920ff9dfdc0e8eaf0213fdef08a90b8ac52c4dc8228eb09ac2e37573adc065fc69849b12e251da3a2a52f9c50f8ce222678
-
Filesize
183B
MD58d00b23642fd51ec774d4710cff02cfc
SHA106c2b168186ed57531ffcde936ecf5f4511bbd7b
SHA2569e15b351313fcbf386243f95066792689ba992fcdc69161a1673794c62cbd8a4
SHA512e4c2f45a074e04bf54094725970e4c1052320952864bdc859993cd28a2b5d15b2b57e57709423ef9badf6b25a45d08e6556dc7131b1c4ff3158a73c612df8043
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
7.9MB
MD5942917c1baa64ae7ae0454fdcb09a40e
SHA14ba810814c1bd592b7036ea8566063fd83e743f3
SHA256f1d6462544fcee1f36b76a780510c7b5805e0e1e0fd51686fd21b90ad5edde48
SHA512972870f7e4754803d67b5f3c968764c88b70d4adb9029bc777d7d18504216bbbd8153656f93ec47ca2b154cee4c3d58001bb8623912f3d9c85bbb32586587b8f