Overview
overview
7Static
static
72100dd61aa...18.exe
windows7-x64
72100dd61aa...18.exe
windows10-2004-x64
7$PLUGINSDI...el.dll
windows7-x64
7$PLUGINSDI...el.dll
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$TEMP/SDM1...er.dll
windows7-x64
7$TEMP/SDM1...er.dll
windows10-2004-x64
7$TEMP/SDM1...es.exe
windows7-x64
7$TEMP/SDM1...es.exe
windows10-2004-x64
7$TEMP/SDM1...er.dll
windows7-x64
3$TEMP/SDM1...er.dll
windows10-2004-x64
3$TEMP/SDM1...er.exe
windows7-x64
1$TEMP/SDM1...er.exe
windows10-2004-x64
1$TEMP/SDM1...ll.dll
windows7-x64
7$TEMP/SDM1...ll.dll
windows10-2004-x64
7Analysis
-
max time kernel
142s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 16:03
Behavioral task
behavioral1
Sample
2100dd61aa4983e8d3fdee18ade84c21_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2100dd61aa4983e8d3fdee18ade84c21_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
$TEMP/SDM143/ExentCtlInstaller.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$TEMP/SDM143/ExentCtlInstaller.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
$TEMP/SDM143/Free Ride Games.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$TEMP/SDM143/Free Ride Games.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
$TEMP/SDM143/Splasher.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$TEMP/SDM143/Splasher.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
$TEMP/SDM143/cmhelper.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$TEMP/SDM143/cmhelper.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
$TEMP/SDM143/resourceDll.dll
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
$TEMP/SDM143/resourceDll.dll
Resource
win10v2004-20240419-en
General
-
Target
2100dd61aa4983e8d3fdee18ade84c21_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
2100dd61aa4983e8d3fdee18ade84c21
-
SHA1
061f3aac07cdc9177e0fb3642bc1d2c923500e90
-
SHA256
480b5066ad2a0c76aa3cd99d7626845ad79dfb80488491bfbeb0b29ed0e95a7d
-
SHA512
3c543ebc060cc2486fa09176682a5fc92776b1e1d091905a3b79d1fceff3b02c005472dcff30c8df7b2d9eb795ab82c329ccc4e20761cfd588469c3f4e5f60be
-
SSDEEP
24576:+QXvmjWP/UVldr7wh3dsT8FRZuzslwXpdy2NZQ6yHp4PZwfQ95a3g6:NFHmr0NsEuYA82HEHiPZwW5aw6
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000a000000023ba4-46.dat acprotect -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000a000000023ba1-42.dat upx behavioral2/memory/3708-44-0x0000000000400000-0x0000000000554000-memory.dmp upx behavioral2/memory/3708-47-0x0000000010000000-0x000000001009F000-memory.dmp upx behavioral2/files/0x000a000000023ba4-46.dat upx behavioral2/memory/3708-52-0x0000000010000000-0x000000001009F000-memory.dmp upx behavioral2/memory/3708-170-0x0000000000400000-0x0000000000554000-memory.dmp upx -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: Free Ride Games.exe File opened (read-only) \??\B: Free Ride Games.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Free Ride Games.exe -
Executes dropped EXE 33 IoCs
pid Process 3708 Free Ride Games.exe 1320 cmhelper.exe 1468 cmhelper.exe 4124 cmhelper.exe 4788 cmhelper.exe 2556 cmhelper.exe 2408 cmhelper.exe 4484 cmhelper.exe 1396 cmhelper.exe 872 cmhelper.exe 4236 cmhelper.exe 3212 cmhelper.exe 1144 cmhelper.exe 3096 cmhelper.exe 4604 cmhelper.exe 2768 cmhelper.exe 3068 cmhelper.exe 4584 cmhelper.exe 4868 cmhelper.exe 4628 cmhelper.exe 3912 cmhelper.exe 2152 cmhelper.exe 3736 cmhelper.exe 2884 cmhelper.exe 2716 cmhelper.exe 912 cmhelper.exe 4520 cmhelper.exe 1412 cmhelper.exe 4464 cmhelper.exe 1468 cmhelper.exe 4936 cmhelper.exe 4300 cmhelper.exe 3996 cmhelper.exe -
Loads dropped DLL 5 IoCs
pid Process 4308 2100dd61aa4983e8d3fdee18ade84c21_JaffaCakes118.exe 4308 2100dd61aa4983e8d3fdee18ade84c21_JaffaCakes118.exe 3708 Free Ride Games.exe 3708 Free Ride Games.exe 3708 Free Ride Games.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Free Ride Games.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Free Ride Games.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache cmhelper.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache cmhelper.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings cmhelper.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Extensible Cache cmhelper.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache cmhelper.exe Key created \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings cmhelper.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3708 Free Ride Games.exe 3708 Free Ride Games.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3708 Free Ride Games.exe 3708 Free Ride Games.exe 3708 Free Ride Games.exe 3708 Free Ride Games.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4308 wrote to memory of 3708 4308 2100dd61aa4983e8d3fdee18ade84c21_JaffaCakes118.exe 85 PID 4308 wrote to memory of 3708 4308 2100dd61aa4983e8d3fdee18ade84c21_JaffaCakes118.exe 85 PID 4308 wrote to memory of 3708 4308 2100dd61aa4983e8d3fdee18ade84c21_JaffaCakes118.exe 85 PID 3708 wrote to memory of 1320 3708 Free Ride Games.exe 93 PID 3708 wrote to memory of 1320 3708 Free Ride Games.exe 93 PID 3708 wrote to memory of 1320 3708 Free Ride Games.exe 93 PID 1468 wrote to memory of 4124 1468 cmhelper.exe 97 PID 1468 wrote to memory of 4124 1468 cmhelper.exe 97 PID 1468 wrote to memory of 4124 1468 cmhelper.exe 97 PID 3708 wrote to memory of 4788 3708 Free Ride Games.exe 99 PID 3708 wrote to memory of 4788 3708 Free Ride Games.exe 99 PID 3708 wrote to memory of 4788 3708 Free Ride Games.exe 99 PID 2556 wrote to memory of 2408 2556 cmhelper.exe 102 PID 2556 wrote to memory of 2408 2556 cmhelper.exe 102 PID 2556 wrote to memory of 2408 2556 cmhelper.exe 102 PID 3708 wrote to memory of 4484 3708 Free Ride Games.exe 103 PID 3708 wrote to memory of 4484 3708 Free Ride Games.exe 103 PID 3708 wrote to memory of 4484 3708 Free Ride Games.exe 103 PID 4484 wrote to memory of 1396 4484 cmhelper.exe 104 PID 4484 wrote to memory of 1396 4484 cmhelper.exe 104 PID 4484 wrote to memory of 1396 4484 cmhelper.exe 104 PID 3708 wrote to memory of 872 3708 Free Ride Games.exe 105 PID 3708 wrote to memory of 872 3708 Free Ride Games.exe 105 PID 3708 wrote to memory of 872 3708 Free Ride Games.exe 105 PID 4236 wrote to memory of 3212 4236 cmhelper.exe 107 PID 4236 wrote to memory of 3212 4236 cmhelper.exe 107 PID 4236 wrote to memory of 3212 4236 cmhelper.exe 107 PID 3708 wrote to memory of 1144 3708 Free Ride Games.exe 108 PID 3708 wrote to memory of 1144 3708 Free Ride Games.exe 108 PID 3708 wrote to memory of 1144 3708 Free Ride Games.exe 108 PID 3096 wrote to memory of 4604 3096 cmhelper.exe 110 PID 3096 wrote to memory of 4604 3096 cmhelper.exe 110 PID 3096 wrote to memory of 4604 3096 cmhelper.exe 110 PID 3708 wrote to memory of 2768 3708 Free Ride Games.exe 111 PID 3708 wrote to memory of 2768 3708 Free Ride Games.exe 111 PID 3708 wrote to memory of 2768 3708 Free Ride Games.exe 111 PID 2768 wrote to memory of 3068 2768 cmhelper.exe 112 PID 2768 wrote to memory of 3068 2768 cmhelper.exe 112 PID 2768 wrote to memory of 3068 2768 cmhelper.exe 112 PID 3708 wrote to memory of 4584 3708 Free Ride Games.exe 113 PID 3708 wrote to memory of 4584 3708 Free Ride Games.exe 113 PID 3708 wrote to memory of 4584 3708 Free Ride Games.exe 113 PID 4868 wrote to memory of 4628 4868 cmhelper.exe 115 PID 4868 wrote to memory of 4628 4868 cmhelper.exe 115 PID 4868 wrote to memory of 4628 4868 cmhelper.exe 115 PID 3708 wrote to memory of 3912 3708 Free Ride Games.exe 116 PID 3708 wrote to memory of 3912 3708 Free Ride Games.exe 116 PID 3708 wrote to memory of 3912 3708 Free Ride Games.exe 116 PID 2152 wrote to memory of 3736 2152 cmhelper.exe 118 PID 2152 wrote to memory of 3736 2152 cmhelper.exe 118 PID 2152 wrote to memory of 3736 2152 cmhelper.exe 118 PID 3708 wrote to memory of 2884 3708 Free Ride Games.exe 119 PID 3708 wrote to memory of 2884 3708 Free Ride Games.exe 119 PID 3708 wrote to memory of 2884 3708 Free Ride Games.exe 119 PID 3708 wrote to memory of 2716 3708 Free Ride Games.exe 120 PID 3708 wrote to memory of 2716 3708 Free Ride Games.exe 120 PID 3708 wrote to memory of 2716 3708 Free Ride Games.exe 120 PID 2884 wrote to memory of 912 2884 cmhelper.exe 121 PID 2884 wrote to memory of 912 2884 cmhelper.exe 121 PID 2884 wrote to memory of 912 2884 cmhelper.exe 121 PID 3708 wrote to memory of 4520 3708 Free Ride Games.exe 122 PID 3708 wrote to memory of 4520 3708 Free Ride Games.exe 122 PID 3708 wrote to memory of 4520 3708 Free Ride Games.exe 122 PID 1412 wrote to memory of 4464 1412 cmhelper.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\2100dd61aa4983e8d3fdee18ade84c21_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2100dd61aa4983e8d3fdee18ade84c21_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\SDM143\Free Ride Games.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\Free Ride Games.exe" "u 'http://www.freeridegames.com/spdo/feeds/sdmConfig?camp=%s&serviceId=143&gameId=%d' p '143' c '610150' m 'playfincom' t '0' l 'Default'"2⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeUHR3⤵
- Executes dropped EXE
PID:1320
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeUPR3⤵
- Executes dropped EXE
PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeER3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeR4⤵
- Executes dropped EXE
- Modifies registry class
PID:1396
-
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeUHW3⤵
- Executes dropped EXE
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeUPW3⤵
- Executes dropped EXE
PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeEW3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW4⤵
- Executes dropped EXE
PID:3068
-
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeUHW3⤵
- Executes dropped EXE
PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeUPW3⤵
- Executes dropped EXE
PID:3912
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeEW3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW4⤵
- Executes dropped EXE
PID:912
-
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeUHW3⤵
- Executes dropped EXE
PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeUPW3⤵
- Executes dropped EXE
PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeEW3⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW4⤵
- Executes dropped EXE
PID:3996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" HR1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeR2⤵
- Executes dropped EXE
- Modifies registry class
PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" PR1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeR2⤵
- Executes dropped EXE
PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" HW1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW2⤵
- Executes dropped EXE
PID:3212
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" PW1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW2⤵
- Executes dropped EXE
PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" HW1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW2⤵
- Executes dropped EXE
PID:4628
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" PW1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW2⤵
- Executes dropped EXE
PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" HW1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW2⤵
- Executes dropped EXE
PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" PW1⤵
- Executes dropped EXE
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW2⤵
- Executes dropped EXE
PID:4300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119B
MD51f491dca9b1d377104635255a8387b78
SHA1ab3fed6381fcb21a90753c35f72739f736965084
SHA256336fb11c29cd7a96cfde4061e65c64d23b2bdcd1720c739b49589ffff7f5f64e
SHA512db9d19848767127132be91ffa5fb8825596646723b6945de4ff1b2f32b60ab539da0fff02a0c9b1d0d8fae721c773a42a8a9438c77626b696ff86c0ae4f8a113
-
Filesize
236B
MD5dcc8221b730cb7f2669ddb53e584251c
SHA198fa735a2ace0670586a554241a6a5d24f4c1a9e
SHA256b0b7993d1a562d7ef7b178b3e39d0baa8984bc73ad5361af27b7b571f8838d57
SHA5127b9e0470fcd8d30e05f11195d06ce7955d1b3120dd1c7345b6403ffd958f74a9d46b264329a0289462531df3f745b8f98578c88abf6ce060e9cc1c66d4316d10
-
Filesize
104B
MD50ef30583cda51acd60ba2686bc0eb474
SHA1951b6fd2178e6fe232fbb4fc15ec7bf60df273a9
SHA256eb372cf4a79a088b6f3bcae49028ef87167c52317f0129e0f6db986c963193d7
SHA5128eabf964c4cb6b01f0596151c28e7a23b896d6df3d280f33b75306bf8ae7dbb8ebf90e4c9bbebabe4358ea1b443eda970213e93ee45fada1a22f9309e42be59b
-
Filesize
23B
MD54174cb800274e3c271f7e53ae1b9ae35
SHA16ac0ca77eef3b68c8db3349f1ceb0c8083450642
SHA256d5e0a12b015868fdafdbdcef807fee6bf17e326db04c64079833e829bf34112e
SHA512c73823299a4706ad1feec4497c1e01c598beebe5679a1bbae2cfa6305b282f719c5c14c1fbc3d982db111cda6cdcc7721f22880391155ae9112f6b5f1cdb7cdd
-
Filesize
206B
MD5aaf191f0cf8c1c01694b4fc6cd7b605d
SHA11887ac850358015a9191e6a51f125d1f0cb621d8
SHA2567d2f21ba517a59f132c0f39871b2c1188b915aa97f41f214414f23d4cdec48c7
SHA512dfc5ceb9935967fe046014d8043f44e14b7debd56a6c8e3e803e72cd6833b247d8e01293a0b14aba904898ebd8e1f06b50cbdc063b7beddda56b92069670d2cf
-
Filesize
503KB
MD5dc7b5f12c7ff9af697203cb0c59a3516
SHA11769c4f64f8ab818a797e3fa1e5331a50ffdd678
SHA256b07ca37c2938966d2290c8b76f039febe8da9a919ad235b8eedaa583ce991b92
SHA512904ae1dc91e5315f05be5cd7239f3fc4d3702b8c78dfd93d76b64d1cc1d7051aa005de2c69e5a8654eae8131dbd3d80c66f6e33d7c8b097972285405a5799350
-
Filesize
469KB
MD5a6a8f89250cdc734a163868a0f5cccea
SHA16ab06aaf1e795bc1a72c8095708568cf2d3bed38
SHA2567868cec689ba10bb6d8a5a1abc0508183b817e5814fc504e090e104dd7d37483
SHA5127991d28467ee0a896e304d18c7fc4caac9e9ac2f57198313d5688ddc68e22ae80447c92a097b5e4ed6ff86a90df607ff1ffa61c07082f85b5f222b07aa4a7ca2
-
Filesize
234KB
MD52c3c18baaee7775b6d588cdf1529e528
SHA188fa58fbabde59e80c96e7676730ca40d1649b9a
SHA2569c980d85903561c44f84faaee80d911bf3c9ef9d238fe69b7ccc6998d0fe9232
SHA5124b69953b02d5c810003eb938da85b51b4906c48e48f441175a3ab76b6e8e5dc293ee683a9c90503b3db4ae72cd6557b8609dc1f4fefc82322f946a7072208348
-
Filesize
171KB
MD50c395ce6f6961054219b6d34927f8903
SHA155fd653c8f6d1253e221d49f1dd097ea73262d55
SHA256e31a495075247fba426b5a4928560a578eaab44f828a2fdca496a05589509352
SHA512e6b2f487eea8c5687a41ad58d955cb67b48881a728eb84f730a1d8ec50057bf80f77a21e22ad977673bff9d783deac02ebeab7252ccc7f98b3ecc34486b2b67b
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d