Analysis
-
max time kernel
142s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 20:50
Behavioral task
behavioral1
Sample
262a3d65ee164c547a7f54447464c47b_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
262a3d65ee164c547a7f54447464c47b_JaffaCakes118.exe
-
Size
815KB
-
MD5
262a3d65ee164c547a7f54447464c47b
-
SHA1
86e1684153eccad2c07e26bd87d2aebef7fb6779
-
SHA256
83c63881c74615713912233cd38bba032174ba605644d8e142f7bb207081ad93
-
SHA512
960bf71dfc60627acfd3b6e9463f7f7458c8a6001bb69d327d03cf33bf08e2f85723bce24079da91b35ef5d99c600dd87e175fdaf03c236218a683fd555374f1
-
SSDEEP
12288:J4vqmbCG6JrmL+qhzt7fz+7nBd1c87hmAd8G:J4vDbGFmBPzzsbc8b1
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2616-52-0x0000000000400000-0x0000000000458000-memory.dmp family_gh0strat -
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\~__UNINST.EXE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\~__UNINST.EXE:*:enabled:@shell32.dll,-1" ~__UNINST.EXE Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List ~__UNINST.EXE Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile ~__UNINST.EXE Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications ~__UNINST.EXE -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 262a3d65ee164c547a7f54447464c47b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation ~__UNINST.EXE -
Deletes itself 1 IoCs
pid Process 4872 ~__UNINST.EXE -
Executes dropped EXE 3 IoCs
pid Process 4872 ~__UNINST.EXE 2616 server.exe 1740 VIP Patcher.exe -
resource yara_rule behavioral2/memory/1576-0-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/files/0x000700000002325a-5.dat upx behavioral2/memory/1576-10-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/files/0x0008000000023429-18.dat upx behavioral2/memory/2616-31-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/files/0x000700000002342a-33.dat upx behavioral2/memory/1740-40-0x0000000000400000-0x0000000000528000-memory.dmp upx behavioral2/memory/2616-52-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/1740-53-0x0000000000400000-0x0000000000528000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\ralogin.text VIP Patcher.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 852 2616 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2616 server.exe 2616 server.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe 2616 server.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2616 server.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 VIP Patcher.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1740 VIP Patcher.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1740 VIP Patcher.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1576 wrote to memory of 4872 1576 262a3d65ee164c547a7f54447464c47b_JaffaCakes118.exe 83 PID 1576 wrote to memory of 4872 1576 262a3d65ee164c547a7f54447464c47b_JaffaCakes118.exe 83 PID 1576 wrote to memory of 4872 1576 262a3d65ee164c547a7f54447464c47b_JaffaCakes118.exe 83 PID 4872 wrote to memory of 2616 4872 ~__UNINST.EXE 84 PID 4872 wrote to memory of 2616 4872 ~__UNINST.EXE 84 PID 4872 wrote to memory of 2616 4872 ~__UNINST.EXE 84 PID 4872 wrote to memory of 1740 4872 ~__UNINST.EXE 85 PID 4872 wrote to memory of 1740 4872 ~__UNINST.EXE 85 PID 4872 wrote to memory of 1740 4872 ~__UNINST.EXE 85 PID 2616 wrote to memory of 608 2616 server.exe 5 PID 2616 wrote to memory of 608 2616 server.exe 5 PID 2616 wrote to memory of 608 2616 server.exe 5 PID 2616 wrote to memory of 608 2616 server.exe 5 PID 2616 wrote to memory of 608 2616 server.exe 5 PID 2616 wrote to memory of 608 2616 server.exe 5 PID 2616 wrote to memory of 660 2616 server.exe 7 PID 2616 wrote to memory of 660 2616 server.exe 7 PID 2616 wrote to memory of 660 2616 server.exe 7 PID 2616 wrote to memory of 660 2616 server.exe 7 PID 2616 wrote to memory of 660 2616 server.exe 7 PID 2616 wrote to memory of 660 2616 server.exe 7 PID 2616 wrote to memory of 780 2616 server.exe 8 PID 2616 wrote to memory of 780 2616 server.exe 8 PID 2616 wrote to memory of 780 2616 server.exe 8 PID 2616 wrote to memory of 780 2616 server.exe 8 PID 2616 wrote to memory of 780 2616 server.exe 8 PID 2616 wrote to memory of 780 2616 server.exe 8 PID 2616 wrote to memory of 784 2616 server.exe 9 PID 2616 wrote to memory of 784 2616 server.exe 9 PID 2616 wrote to memory of 784 2616 server.exe 9 PID 2616 wrote to memory of 784 2616 server.exe 9 PID 2616 wrote to memory of 784 2616 server.exe 9 PID 2616 wrote to memory of 784 2616 server.exe 9 PID 2616 wrote to memory of 796 2616 server.exe 10 PID 2616 wrote to memory of 796 2616 server.exe 10 PID 2616 wrote to memory of 796 2616 server.exe 10 PID 2616 wrote to memory of 796 2616 server.exe 10 PID 2616 wrote to memory of 796 2616 server.exe 10 PID 2616 wrote to memory of 796 2616 server.exe 10 PID 2616 wrote to memory of 908 2616 server.exe 11 PID 2616 wrote to memory of 908 2616 server.exe 11 PID 2616 wrote to memory of 908 2616 server.exe 11 PID 2616 wrote to memory of 908 2616 server.exe 11 PID 2616 wrote to memory of 908 2616 server.exe 11 PID 2616 wrote to memory of 908 2616 server.exe 11 PID 2616 wrote to memory of 956 2616 server.exe 12 PID 2616 wrote to memory of 956 2616 server.exe 12 PID 2616 wrote to memory of 956 2616 server.exe 12 PID 2616 wrote to memory of 956 2616 server.exe 12 PID 2616 wrote to memory of 956 2616 server.exe 12 PID 2616 wrote to memory of 956 2616 server.exe 12 PID 2616 wrote to memory of 1020 2616 server.exe 13 PID 2616 wrote to memory of 1020 2616 server.exe 13 PID 2616 wrote to memory of 1020 2616 server.exe 13 PID 2616 wrote to memory of 1020 2616 server.exe 13 PID 2616 wrote to memory of 1020 2616 server.exe 13 PID 2616 wrote to memory of 1020 2616 server.exe 13 PID 2616 wrote to memory of 504 2616 server.exe 14 PID 2616 wrote to memory of 504 2616 server.exe 14 PID 2616 wrote to memory of 504 2616 server.exe 14 PID 2616 wrote to memory of 504 2616 server.exe 14 PID 2616 wrote to memory of 504 2616 server.exe 14 PID 2616 wrote to memory of 504 2616 server.exe 14 PID 2616 wrote to memory of 924 2616 server.exe 15
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:608
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:784
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1020
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:660
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:796
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2504
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3704
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3796
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3856
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3980
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3064
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:4052
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3896
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:4500
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4788
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:4608
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:2848
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:1664
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4228
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:504
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:924
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1112
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:3056
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1124
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1132
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1424
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2640
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1580
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1588
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1600
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1712
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1732
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1812
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:1924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2020
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2032
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1348
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2080
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2256
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2276
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2484
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2492
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2712
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2752
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2780
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2788
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2188
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3284
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\262a3d65ee164c547a7f54447464c47b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\262a3d65ee164c547a7f54447464c47b_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\~__UNINST.EXE"C:\Users\Admin\AppData\Local\Temp\~__UNINST.EXE" C:\Users\Admin\AppData\Local\Temp\262a3d65ee164c547a7f54447464c47b_JaffaCakes118.exe3⤵
- Modifies firewall policy service
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 5045⤵
- Program crash
PID:852
-
-
-
C:\Users\Admin\AppData\Local\Temp\VIP Patcher.exe"C:\Users\Admin\AppData\Local\Temp\VIP Patcher.exe" ADL4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4748
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4260
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2056
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2616 -ip 26161⤵PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
585KB
MD56ddddcf60491b190587628d3b1ffaf57
SHA1a55f31c267e1a3b00e9957f4f2ded22b0861c23e
SHA256be3a6f41394a20933d07be5d20427ec3393316d4b619d8b6b1fb45cd5d4f4b85
SHA512f46b61ba7d9d7d160e868919d98edcc563c1178e7c004361008934fb02882d39e9a312a507f00967ec30d13e4b1c0c876fec1ab055831494a5d35da102b924ed
-
Filesize
223KB
MD546b55ebb63b9bbb383a411636e3e83f9
SHA1fc60985d41a9a88a5c359455e755a8a659150484
SHA2561fc6e79052d6669bb4ef12a6a34b2b0840b3a6acafcb8981e80dcc29d7e0b2f7
SHA512b4adcfcbfdc5ef25eadfd599eec254f45f8c19d08a16710dba3a79d8f8d4405c96df608c25c6b76762273ff25d8d4ba126553368200c84ad3fcb393105b556dc
-
Filesize
815KB
MD5262a3d65ee164c547a7f54447464c47b
SHA186e1684153eccad2c07e26bd87d2aebef7fb6779
SHA25683c63881c74615713912233cd38bba032174ba605644d8e142f7bb207081ad93
SHA512960bf71dfc60627acfd3b6e9463f7f7458c8a6001bb69d327d03cf33bf08e2f85723bce24079da91b35ef5d99c600dd87e175fdaf03c236218a683fd555374f1