Overview
overview
7Static
static
780ede1662b...18.exe
windows7-x64
780ede1662b...18.exe
windows10-2004-x64
7$PLUGINSDI...el.dll
windows7-x64
7$PLUGINSDI...el.dll
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$TEMP/SDM1...er.dll
windows7-x64
7$TEMP/SDM1...er.dll
windows10-2004-x64
7$TEMP/SDM1...es.exe
windows7-x64
7$TEMP/SDM1...es.exe
windows10-2004-x64
7$TEMP/SDM1...er.dll
windows7-x64
1$TEMP/SDM1...er.dll
windows10-2004-x64
3$TEMP/SDM1...er.exe
windows7-x64
1$TEMP/SDM1...er.exe
windows10-2004-x64
1$TEMP/SDM1...ll.dll
windows7-x64
7$TEMP/SDM1...ll.dll
windows10-2004-x64
7Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 13:40
Behavioral task
behavioral1
Sample
80ede1662b42a7b11aecfda957382ac2_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
80ede1662b42a7b11aecfda957382ac2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$TEMP/SDM143/ExentCtlInstaller.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$TEMP/SDM143/ExentCtlInstaller.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$TEMP/SDM143/Free Ride Games.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$TEMP/SDM143/Free Ride Games.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$TEMP/SDM143/Splasher.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
$TEMP/SDM143/Splasher.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
$TEMP/SDM143/cmhelper.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$TEMP/SDM143/cmhelper.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$TEMP/SDM143/resourceDll.dll
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
$TEMP/SDM143/resourceDll.dll
Resource
win10v2004-20240508-en
General
-
Target
80ede1662b42a7b11aecfda957382ac2_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
80ede1662b42a7b11aecfda957382ac2
-
SHA1
cd6535588a45a3ef117ba780e8de10b749a166ac
-
SHA256
6b7eace348b11fc8fb50a6e40492839972dfda5853ed83d86f73c9017af01089
-
SHA512
c3235151a3887948a63d89a25e56801176d7e65a5a6a6b9421fc92bebf67db666af24018f8643ae7a23c0157cccbfa46d539c15341ba0d1fbdf4959e994c6d83
-
SSDEEP
24576:FCXXvmjWP/UVldr7wh3dsT8FRZuzslwXpdy2NZQ6yHp4PZwfQ95a3gm:oXFHmr0NsEuYA82HEHiPZwW5awm
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00070000000233e0-45.dat acprotect -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x00070000000233dd-42.dat upx behavioral2/memory/2252-44-0x0000000000400000-0x0000000000554000-memory.dmp upx behavioral2/files/0x00070000000233e0-45.dat upx behavioral2/memory/2252-52-0x0000000010000000-0x000000001009F000-memory.dmp upx behavioral2/memory/2252-157-0x0000000000400000-0x0000000000554000-memory.dmp upx -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: Free Ride Games.exe File opened (read-only) \??\B: Free Ride Games.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Free Ride Games.exe -
Executes dropped EXE 33 IoCs
pid Process 2252 Free Ride Games.exe 2128 cmhelper.exe 3416 cmhelper.exe 1652 cmhelper.exe 2344 cmhelper.exe 4688 cmhelper.exe 1232 cmhelper.exe 2036 cmhelper.exe 2672 cmhelper.exe 3992 cmhelper.exe 2464 cmhelper.exe 3048 cmhelper.exe 3980 cmhelper.exe 3464 cmhelper.exe 3976 cmhelper.exe 5092 cmhelper.exe 1220 cmhelper.exe 4964 cmhelper.exe 3172 cmhelper.exe 1492 cmhelper.exe 720 cmhelper.exe 2260 cmhelper.exe 4508 cmhelper.exe 2340 cmhelper.exe 4348 cmhelper.exe 708 cmhelper.exe 4480 cmhelper.exe 4604 cmhelper.exe 2364 cmhelper.exe 2004 cmhelper.exe 5028 cmhelper.exe 2428 cmhelper.exe 2932 cmhelper.exe -
Loads dropped DLL 5 IoCs
pid Process 848 80ede1662b42a7b11aecfda957382ac2_JaffaCakes118.exe 848 80ede1662b42a7b11aecfda957382ac2_JaffaCakes118.exe 2252 Free Ride Games.exe 2252 Free Ride Games.exe 2252 Free Ride Games.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Free Ride Games.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Free Ride Games.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache cmhelper.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings cmhelper.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001\Internet Settings\Cache\Extensible Cache cmhelper.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache cmhelper.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings cmhelper.exe Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache cmhelper.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2252 Free Ride Games.exe 2252 Free Ride Games.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2252 Free Ride Games.exe 2252 Free Ride Games.exe 2252 Free Ride Games.exe 2252 Free Ride Games.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 848 wrote to memory of 2252 848 80ede1662b42a7b11aecfda957382ac2_JaffaCakes118.exe 83 PID 848 wrote to memory of 2252 848 80ede1662b42a7b11aecfda957382ac2_JaffaCakes118.exe 83 PID 848 wrote to memory of 2252 848 80ede1662b42a7b11aecfda957382ac2_JaffaCakes118.exe 83 PID 2252 wrote to memory of 2128 2252 Free Ride Games.exe 88 PID 2252 wrote to memory of 2128 2252 Free Ride Games.exe 88 PID 2252 wrote to memory of 2128 2252 Free Ride Games.exe 88 PID 3416 wrote to memory of 1652 3416 cmhelper.exe 91 PID 3416 wrote to memory of 1652 3416 cmhelper.exe 91 PID 3416 wrote to memory of 1652 3416 cmhelper.exe 91 PID 2252 wrote to memory of 2344 2252 Free Ride Games.exe 92 PID 2252 wrote to memory of 2344 2252 Free Ride Games.exe 92 PID 2252 wrote to memory of 2344 2252 Free Ride Games.exe 92 PID 4688 wrote to memory of 1232 4688 cmhelper.exe 94 PID 4688 wrote to memory of 1232 4688 cmhelper.exe 94 PID 4688 wrote to memory of 1232 4688 cmhelper.exe 94 PID 2252 wrote to memory of 2036 2252 Free Ride Games.exe 95 PID 2252 wrote to memory of 2036 2252 Free Ride Games.exe 95 PID 2252 wrote to memory of 2036 2252 Free Ride Games.exe 95 PID 2036 wrote to memory of 2672 2036 cmhelper.exe 96 PID 2036 wrote to memory of 2672 2036 cmhelper.exe 96 PID 2036 wrote to memory of 2672 2036 cmhelper.exe 96 PID 2252 wrote to memory of 3992 2252 Free Ride Games.exe 97 PID 2252 wrote to memory of 3992 2252 Free Ride Games.exe 97 PID 2252 wrote to memory of 3992 2252 Free Ride Games.exe 97 PID 2464 wrote to memory of 3048 2464 cmhelper.exe 99 PID 2464 wrote to memory of 3048 2464 cmhelper.exe 99 PID 2464 wrote to memory of 3048 2464 cmhelper.exe 99 PID 2252 wrote to memory of 3980 2252 Free Ride Games.exe 100 PID 2252 wrote to memory of 3980 2252 Free Ride Games.exe 100 PID 2252 wrote to memory of 3980 2252 Free Ride Games.exe 100 PID 3464 wrote to memory of 3976 3464 cmhelper.exe 102 PID 3464 wrote to memory of 3976 3464 cmhelper.exe 102 PID 3464 wrote to memory of 3976 3464 cmhelper.exe 102 PID 2252 wrote to memory of 5092 2252 Free Ride Games.exe 103 PID 2252 wrote to memory of 5092 2252 Free Ride Games.exe 103 PID 2252 wrote to memory of 5092 2252 Free Ride Games.exe 103 PID 5092 wrote to memory of 1220 5092 cmhelper.exe 104 PID 5092 wrote to memory of 1220 5092 cmhelper.exe 104 PID 5092 wrote to memory of 1220 5092 cmhelper.exe 104 PID 2252 wrote to memory of 4964 2252 Free Ride Games.exe 105 PID 2252 wrote to memory of 4964 2252 Free Ride Games.exe 105 PID 2252 wrote to memory of 4964 2252 Free Ride Games.exe 105 PID 3172 wrote to memory of 1492 3172 cmhelper.exe 107 PID 3172 wrote to memory of 1492 3172 cmhelper.exe 107 PID 3172 wrote to memory of 1492 3172 cmhelper.exe 107 PID 2252 wrote to memory of 720 2252 Free Ride Games.exe 108 PID 2252 wrote to memory of 720 2252 Free Ride Games.exe 108 PID 2252 wrote to memory of 720 2252 Free Ride Games.exe 108 PID 2260 wrote to memory of 4508 2260 cmhelper.exe 110 PID 2260 wrote to memory of 4508 2260 cmhelper.exe 110 PID 2260 wrote to memory of 4508 2260 cmhelper.exe 110 PID 2252 wrote to memory of 2340 2252 Free Ride Games.exe 111 PID 2252 wrote to memory of 2340 2252 Free Ride Games.exe 111 PID 2252 wrote to memory of 2340 2252 Free Ride Games.exe 111 PID 2252 wrote to memory of 4348 2252 Free Ride Games.exe 112 PID 2252 wrote to memory of 4348 2252 Free Ride Games.exe 112 PID 2252 wrote to memory of 4348 2252 Free Ride Games.exe 112 PID 2340 wrote to memory of 708 2340 cmhelper.exe 113 PID 2340 wrote to memory of 708 2340 cmhelper.exe 113 PID 2340 wrote to memory of 708 2340 cmhelper.exe 113 PID 2252 wrote to memory of 4480 2252 Free Ride Games.exe 114 PID 2252 wrote to memory of 4480 2252 Free Ride Games.exe 114 PID 2252 wrote to memory of 4480 2252 Free Ride Games.exe 114 PID 4604 wrote to memory of 2364 4604 cmhelper.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\80ede1662b42a7b11aecfda957382ac2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\80ede1662b42a7b11aecfda957382ac2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\SDM143\Free Ride Games.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\Free Ride Games.exe" "u 'http://www.freeridegames.com/spdo/feeds/sdmConfig?camp=%s&serviceId=143&gameId=%d' p '143' c '638050' m 'Freegame_bing' t '0' l 'Default'"2⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeUHR3⤵
- Executes dropped EXE
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeUPR3⤵
- Executes dropped EXE
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeER3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeR4⤵
- Executes dropped EXE
- Modifies registry class
PID:2672
-
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeUHW3⤵
- Executes dropped EXE
PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeUPW3⤵
- Executes dropped EXE
PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeEW3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW4⤵
- Executes dropped EXE
PID:1220
-
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeUHW3⤵
- Executes dropped EXE
PID:4964
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeUPW3⤵
- Executes dropped EXE
PID:720
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeEW3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW4⤵
- Executes dropped EXE
PID:708
-
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeUHW3⤵
- Executes dropped EXE
PID:4348
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeUPW3⤵
- Executes dropped EXE
PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeEW3⤵
- Executes dropped EXE
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW4⤵
- Executes dropped EXE
PID:2428
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" HR1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeR2⤵
- Executes dropped EXE
- Modifies registry class
PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" PR1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeR2⤵
- Executes dropped EXE
PID:1232
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" HW1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW2⤵
- Executes dropped EXE
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" PW1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW2⤵
- Executes dropped EXE
PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" HW1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW2⤵
- Executes dropped EXE
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" PW1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW2⤵
- Executes dropped EXE
PID:4508
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" HW1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW2⤵
- Executes dropped EXE
PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe"C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exe" PW1⤵
- Executes dropped EXE
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\SDM143\cmhelper.exeW2⤵
- Executes dropped EXE
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD5cca6873ebf082d36ee9e09e515f3408b
SHA1dcb21b85865c5dc859c7767a1edf8012a337a90c
SHA2569f263eaf63343b584db8a9e6e48a7f369c4f80c957bb02da191aa75c4dcf5e2f
SHA512627776fa45b18baa10c83dc9c1a78b6f08c2f4daf20be767a2a3dc684cf5d8f5ff251bbd89eea091055851919eb3bc5c887ecb6193e076dd4d8f9989016bc185
-
Filesize
241B
MD54b38a6bb11370e638a1a447b968a25aa
SHA1a17218ca863cb694fc9dbdf1fd6fd8c0af1df91d
SHA2560b4a915a455638fdb5b6d30c4d0b6ef49dddbe939aa4488d58e67c38ba54c84d
SHA512efe84afada28abb54e849aa9d833695ecd3a30677fcfd160f04018873b2f02d90b4a5405e05a91e33d95e5c2b4bd7833fa1f112b79159f3c5253277356a314b1
-
Filesize
309B
MD5131c0f9ec246e18104921db7e443bf67
SHA19f7c2b9c166a7870f5e244fca2005bec6935b995
SHA25684ac35e413790d6b492b45e053e17f4c9e94c176b427f3ac0ab5e11711e9a833
SHA512c9bce920abe39c4b9cfa7452335c755c78d66daa952ef0b6e69ccbe589256b40a662fd6ca2259be1bca8d35c44a6979a759856e91d1a0bc2d657fa6feefe8481
-
Filesize
23B
MD54174cb800274e3c271f7e53ae1b9ae35
SHA16ac0ca77eef3b68c8db3349f1ceb0c8083450642
SHA256d5e0a12b015868fdafdbdcef807fee6bf17e326db04c64079833e829bf34112e
SHA512c73823299a4706ad1feec4497c1e01c598beebe5679a1bbae2cfa6305b282f719c5c14c1fbc3d982db111cda6cdcc7721f22880391155ae9112f6b5f1cdb7cdd
-
Filesize
108B
MD5b4ab5d02e05994c984a3432ef12df126
SHA1996437ed97722e576182e415b4bb3df16af16560
SHA2563dcf30e70ab8d543694cab5fbe00e192442789bcfd952a8dc39356537605cde7
SHA5123511d2edccc3aed8892bead5794e59e7cc1a2aada69ad104cfe5412a65eb56f6a1115707c8fed4db9f9909aea68714356b86e689e5a07be7ccef36c3f33fad42
-
Filesize
209B
MD57a8d2c183aa623b3e63ba34e0ef16266
SHA109e6a668449e1d788dcff72621ec325fcc824c05
SHA256e0126202c667dcda1b640cd81c6d958c8aa3653318a1bd5a2eb7434bb8b0a9ce
SHA512ca69e2b702bec535b88c0bbb3e26e298a8b24a5f678c87bffeb08d60e43be0ccc902a9fb15d9dda4b569b3fa5dc1e93a7a5adb7b29a6930aa2f695354f26fad3
-
Filesize
503KB
MD5dc7b5f12c7ff9af697203cb0c59a3516
SHA11769c4f64f8ab818a797e3fa1e5331a50ffdd678
SHA256b07ca37c2938966d2290c8b76f039febe8da9a919ad235b8eedaa583ce991b92
SHA512904ae1dc91e5315f05be5cd7239f3fc4d3702b8c78dfd93d76b64d1cc1d7051aa005de2c69e5a8654eae8131dbd3d80c66f6e33d7c8b097972285405a5799350
-
Filesize
469KB
MD5a6a8f89250cdc734a163868a0f5cccea
SHA16ab06aaf1e795bc1a72c8095708568cf2d3bed38
SHA2567868cec689ba10bb6d8a5a1abc0508183b817e5814fc504e090e104dd7d37483
SHA5127991d28467ee0a896e304d18c7fc4caac9e9ac2f57198313d5688ddc68e22ae80447c92a097b5e4ed6ff86a90df607ff1ffa61c07082f85b5f222b07aa4a7ca2
-
Filesize
234KB
MD52c3c18baaee7775b6d588cdf1529e528
SHA188fa58fbabde59e80c96e7676730ca40d1649b9a
SHA2569c980d85903561c44f84faaee80d911bf3c9ef9d238fe69b7ccc6998d0fe9232
SHA5124b69953b02d5c810003eb938da85b51b4906c48e48f441175a3ab76b6e8e5dc293ee683a9c90503b3db4ae72cd6557b8609dc1f4fefc82322f946a7072208348
-
Filesize
171KB
MD50c395ce6f6961054219b6d34927f8903
SHA155fd653c8f6d1253e221d49f1dd097ea73262d55
SHA256e31a495075247fba426b5a4928560a578eaab44f828a2fdca496a05589509352
SHA512e6b2f487eea8c5687a41ad58d955cb67b48881a728eb84f730a1d8ec50057bf80f77a21e22ad977673bff9d783deac02ebeab7252ccc7f98b3ecc34486b2b67b
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d