Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe
-
Size
235KB
-
MD5
50b725a477fd0229c6c8c3bc2a2f0ffc
-
SHA1
0ebb1f1f925103b71c53b9d54bbc81c47ea68e30
-
SHA256
7c6ab5ad391be8a97d9ee5dcb4e72bf321fe7adfdbdd2af5bcd4cd60d3dc2295
-
SHA512
194718bebf04ce6be9febf02cefc052d0cd71cc98d230a377178bad250bdbe0b739428fc7fab77c2e7f3d4df4c8ce11b680ae2462e0a59c426419b06915d8c4d
-
SSDEEP
6144:bl4yvofzaSqxx5jBrOp81N4n1AmMZhs6VgwC6:buzazfdxq17Khs646
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000016d1f-25.dat family_gh0strat behavioral1/memory/2880-56-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/2880-94-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Gh0strat family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ooEPEVtK\Parameters\ServiceDll = "C:\\Windows\\system32\\6oVUDN.dll" ki18FF0.tmp -
Deletes itself 1 IoCs
pid Process 2968 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2992 ki18FF0.tmp 2276 inl97FD.tmp -
Loads dropped DLL 7 IoCs
pid Process 2264 cmd.exe 2264 cmd.exe 2880 svchost.exe 3048 MsiExec.exe 3048 MsiExec.exe 2828 cmd.exe 2828 cmd.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\6oVUDN.dll ki18FF0.tmp File created C:\Windows\SysWOW64\bedgademqw svchost.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe File created C:\Windows\Installer\f769cbc.msi msiexec.exe File opened for modification C:\Windows\Installer\f769cbc.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIA2F3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIA3EE.tmp msiexec.exe File created C:\Windows\Win.ini ki18FF0.tmp File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language expand.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inl97FD.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum svchost.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2992 ki18FF0.tmp 2992 ki18FF0.tmp 2992 ki18FF0.tmp 2992 ki18FF0.tmp 2992 ki18FF0.tmp 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 2992 ki18FF0.tmp 2880 svchost.exe 2880 svchost.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeBackupPrivilege 2992 ki18FF0.tmp Token: SeRestorePrivilege 2992 ki18FF0.tmp Token: SeShutdownPrivilege 2816 msiexec.exe Token: SeIncreaseQuotaPrivilege 2816 msiexec.exe Token: SeIncBasePriorityPrivilege 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe Token: SeRestorePrivilege 2792 msiexec.exe Token: SeTakeOwnershipPrivilege 2792 msiexec.exe Token: SeSecurityPrivilege 2792 msiexec.exe Token: SeCreateTokenPrivilege 2816 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2816 msiexec.exe Token: SeLockMemoryPrivilege 2816 msiexec.exe Token: SeIncreaseQuotaPrivilege 2816 msiexec.exe Token: SeMachineAccountPrivilege 2816 msiexec.exe Token: SeTcbPrivilege 2816 msiexec.exe Token: SeSecurityPrivilege 2816 msiexec.exe Token: SeTakeOwnershipPrivilege 2816 msiexec.exe Token: SeLoadDriverPrivilege 2816 msiexec.exe Token: SeSystemProfilePrivilege 2816 msiexec.exe Token: SeSystemtimePrivilege 2816 msiexec.exe Token: SeProfSingleProcessPrivilege 2816 msiexec.exe Token: SeIncBasePriorityPrivilege 2816 msiexec.exe Token: SeCreatePagefilePrivilege 2816 msiexec.exe Token: SeCreatePermanentPrivilege 2816 msiexec.exe Token: SeBackupPrivilege 2816 msiexec.exe Token: SeRestorePrivilege 2816 msiexec.exe Token: SeShutdownPrivilege 2816 msiexec.exe Token: SeDebugPrivilege 2816 msiexec.exe Token: SeAuditPrivilege 2816 msiexec.exe Token: SeSystemEnvironmentPrivilege 2816 msiexec.exe Token: SeChangeNotifyPrivilege 2816 msiexec.exe Token: SeRemoteShutdownPrivilege 2816 msiexec.exe Token: SeUndockPrivilege 2816 msiexec.exe Token: SeSyncAgentPrivilege 2816 msiexec.exe Token: SeEnableDelegationPrivilege 2816 msiexec.exe Token: SeManageVolumePrivilege 2816 msiexec.exe Token: SeImpersonatePrivilege 2816 msiexec.exe Token: SeCreateGlobalPrivilege 2816 msiexec.exe Token: SeRestorePrivilege 2792 msiexec.exe Token: SeTakeOwnershipPrivilege 2792 msiexec.exe Token: SeBackupPrivilege 2880 svchost.exe Token: SeRestorePrivilege 2880 svchost.exe Token: SeRestorePrivilege 2792 msiexec.exe Token: SeTakeOwnershipPrivilege 2792 msiexec.exe Token: SeRestorePrivilege 2792 msiexec.exe Token: SeTakeOwnershipPrivilege 2792 msiexec.exe Token: SeIncBasePriorityPrivilege 2276 inl97FD.tmp -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2264 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 30 PID 2460 wrote to memory of 2264 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 30 PID 2460 wrote to memory of 2264 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 30 PID 2460 wrote to memory of 2264 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 30 PID 2264 wrote to memory of 2992 2264 cmd.exe 32 PID 2264 wrote to memory of 2992 2264 cmd.exe 32 PID 2264 wrote to memory of 2992 2264 cmd.exe 32 PID 2264 wrote to memory of 2992 2264 cmd.exe 32 PID 2460 wrote to memory of 2816 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 33 PID 2460 wrote to memory of 2816 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 33 PID 2460 wrote to memory of 2816 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 33 PID 2460 wrote to memory of 2816 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 33 PID 2460 wrote to memory of 2816 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 33 PID 2460 wrote to memory of 2816 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 33 PID 2460 wrote to memory of 2816 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 33 PID 2460 wrote to memory of 2828 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 36 PID 2460 wrote to memory of 2828 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 36 PID 2460 wrote to memory of 2828 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 36 PID 2460 wrote to memory of 2828 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 36 PID 2460 wrote to memory of 2840 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 37 PID 2460 wrote to memory of 2840 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 37 PID 2460 wrote to memory of 2840 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 37 PID 2460 wrote to memory of 2840 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 37 PID 2460 wrote to memory of 2968 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 40 PID 2460 wrote to memory of 2968 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 40 PID 2460 wrote to memory of 2968 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 40 PID 2460 wrote to memory of 2968 2460 JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe 40 PID 2840 wrote to memory of 2744 2840 cmd.exe 41 PID 2840 wrote to memory of 2744 2840 cmd.exe 41 PID 2840 wrote to memory of 2744 2840 cmd.exe 41 PID 2840 wrote to memory of 2744 2840 cmd.exe 41 PID 2792 wrote to memory of 3048 2792 msiexec.exe 43 PID 2792 wrote to memory of 3048 2792 msiexec.exe 43 PID 2792 wrote to memory of 3048 2792 msiexec.exe 43 PID 2792 wrote to memory of 3048 2792 msiexec.exe 43 PID 2792 wrote to memory of 3048 2792 msiexec.exe 43 PID 2792 wrote to memory of 3048 2792 msiexec.exe 43 PID 2792 wrote to memory of 3048 2792 msiexec.exe 43 PID 2828 wrote to memory of 2276 2828 cmd.exe 44 PID 2828 wrote to memory of 2276 2828 cmd.exe 44 PID 2828 wrote to memory of 2276 2828 cmd.exe 44 PID 2828 wrote to memory of 2276 2828 cmd.exe 44 PID 2276 wrote to memory of 1096 2276 inl97FD.tmp 47 PID 2276 wrote to memory of 1096 2276 inl97FD.tmp 47 PID 2276 wrote to memory of 1096 2276 inl97FD.tmp 47 PID 2276 wrote to memory of 1096 2276 inl97FD.tmp 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50b725a477fd0229c6c8c3bc2a2f0ffc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\run_kl_file.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\ki18FF0.tmpC:\Users\Admin\AppData\Local\Temp\ki18FF0.tmp3⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ins951F.tmp.msi" /quiet2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\inl97FD.tmpC:\Users\Admin\AppData\Local\Temp\inl97FD.tmp cdf1912.tmp3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl97FD.tmp > nul4⤵
- System Location Discovery: System Language Discovery
PID:1096
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\expand.exeexpand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2744
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2968
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2EF1CE5481895F59A38EB6A73C52D7A12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Pre-OS Boot
1Bootkit
1Server Software Component
1Terminal Services DLL
1Defense Evasion
Indicator Removal
1File Deletion
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
768B
MD5d20d9eda31a2d0300e4589df7f352370
SHA179b46d2dbb489914cfedafdbc90e62951471b48e
SHA256d7a1d6a8cf5c3fbb85cd06147a599f5274630b86b1c89721f10a60c1bbe994d8
SHA512d28c5b69325a9833776ea362445b77b231a0ec9b9b8b4a2ad37a434ee8b2b0c1903d6ade1e372f73ac8ada951e0a24076cf23d9307d27fed5927f4bf8b0d0a5e
-
Filesize
57B
MD535a19de817a69ede46fa6bb5b75a5360
SHA1e93b927345be489e471a2ca88b08ec1e18087b17
SHA2568c6aab41c846605da42db437fe758e7bcf584343493f2a0c2dc75169c441468b
SHA512488b004f0fb7e11c1908501264e21ad446df9e54d89a474cfbeb9db009a83b12845d7a87db625570220ccb56d0a3388f7740fdb8ec9ee8691387cfb5c196f141
-
Filesize
45B
MD5f50df4fc34ace3a63714573868978727
SHA1d7cca4eaa8bef94625c995426cec5ab253de35f9
SHA256eb047564c8d8f1bfaa36a9a7f7b03027d9c490ddd1c635cd53deaa98af07f866
SHA512fec355b5abc75e65de6b94a0edc0b00955e69fad9e853476b7c4cb54716e9dca81fa2c9362ff3441ea071037f9a22863241d2cb6f807d3d513bc34aca5deea52
-
Filesize
98B
MD58663de6fce9208b795dc913d1a6a3f5b
SHA1882193f208cf012eaf22eeaa4fef3b67e7c67c15
SHA2562909ea8555f2fc19097c1070a1da8fcfd6dc6886aa1d99d7e0c05e53feeb5b61
SHA5129381063e0f85e874be54ae22675393b82c6ab54b223090148e4acbeff6f22393c96c90b83d6538461b695528af01d1f1231cf5dc719f07d6168386974b490688
-
Filesize
48KB
MD59067aad412defc0d2888479609041392
SHA136cfffc3bafeb24f88ad5886ca5787ca008b6ba9
SHA25699f4e00b6908057a2fe5067ff6c8b6e32b5c07558ab79139dc4b998f1da4b517
SHA512e69f259d78b02e6c1a5d9c45898b59372329a5288fff655dd741353f112b2b8eed18b01caa2bf312a91f5e314e1c0b036321b37c8efbebdcf3650ba6b12dee6a
-
Filesize
425B
MD5da68bc3b7c3525670a04366bc55629f5
SHA115fda47ecfead7db8f7aee6ca7570138ba7f1b71
SHA25673f3605192b676c92649034768378909a19d13883a7ea6f8ba1b096c78ffadb5
SHA5126fee416affcb6a74621479697bca6f14f5429b00de3aa595abe3c60c6b2e094877b59f8783bbe7bdd567fa565d0630bb02def5603f8f0ea92fe8f2c3ac5383c0
-
Filesize
48.1MB
MD59c942b3c3d0e26012b3667169f8428ca
SHA177705073ad89eb76faba58a66bcf01b96163a0f5
SHA2569dddeef00354e7a8204a2755556bc1d63987d5b8ccdf6c873ed5a90377e26cb3
SHA5123a64c8084a16d7e16a163ad58d5fcc26188e8bc63a39409573971028966ab4eae55623f39a2fab8a31a1656f4be6642bd5d7a626d52b9e46c3d9dbbad4c944f7