Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 14:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ea51400c42c8b72137ec73f82b662096.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_ea51400c42c8b72137ec73f82b662096.exe
-
Size
116KB
-
MD5
ea51400c42c8b72137ec73f82b662096
-
SHA1
66aac478e6ad8670f632411a110e073eb9e3387d
-
SHA256
25b61913dd908b2ad3953638404c2ed3e762ea80a87ca3c93859c589cfb109b3
-
SHA512
5ba150487aaa124307ee7eedd53f18bbc2898b42ac33b91e1fa96b54a7482b84ff44e1accb46f244f4f1d0bf57b9e924c3aeb2a2dcf05b92e2f9ebf5c620687b
-
SSDEEP
1536:AVZnxm6MG9xgfrvEaoiT/GyphjXDYjKwttoswRmhApEa:wnxwgxgfR/DVG7wBpEa
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 3060 WaterMark.exe -
Loads dropped DLL 2 IoCs
pid Process 768 JaffaCakes118_ea51400c42c8b72137ec73f82b662096.exe 768 JaffaCakes118_ea51400c42c8b72137ec73f82b662096.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
resource yara_rule behavioral1/memory/768-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/768-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/768-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/768-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/768-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/768-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/768-1-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/3060-26-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/3060-69-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/3060-592-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\pdm.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libgaussianblur_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\picturePuzzle.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACEOLEDB.DLL svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libmp4_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\weather.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\hxdsui.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libh26x_plugin.dll svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\mshwLatin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\about.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi420_rgb_sse2_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\pe.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\Microsoft.Ink.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libdtv_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_mpjpeg_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\settings.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\about.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\UIAutomationClient.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\Microsoft.Build.Utilities.v3.5.resources.dll svchost.exe File opened for modification C:\Program Files\Windows Defender\MpClient.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tabskb.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libspdif_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\currency.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_equalizer.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libshm_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libdxva2_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\plugin2\msvcr100.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\System.Data.Services.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Windows.Presentation.resources.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\flyout.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\PresentationBuildTasks.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libdshow_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\libarchive_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Journal\JNTFiltr.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_output\libwaveout_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\Microsoft.Ink.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadce.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\olh001.htm svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\management.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.ServiceModel.Web.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\libinteger_mixer_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libspudec_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_display_plugin.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\splashscreen.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\epl-v10.html svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\decora-sse.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\librawaud_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\settings.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSSOAP30.DLL svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\j2pcsc.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\System.Windows.Presentation.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libequalizer_plugin.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ea51400c42c8b72137ec73f82b662096.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 3060 WaterMark.exe 3060 WaterMark.exe 3060 WaterMark.exe 3060 WaterMark.exe 3060 WaterMark.exe 3060 WaterMark.exe 3060 WaterMark.exe 3060 WaterMark.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe 2640 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3060 WaterMark.exe Token: SeDebugPrivilege 2640 svchost.exe Token: SeDebugPrivilege 3060 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 768 JaffaCakes118_ea51400c42c8b72137ec73f82b662096.exe 3060 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 768 wrote to memory of 3060 768 JaffaCakes118_ea51400c42c8b72137ec73f82b662096.exe 30 PID 768 wrote to memory of 3060 768 JaffaCakes118_ea51400c42c8b72137ec73f82b662096.exe 30 PID 768 wrote to memory of 3060 768 JaffaCakes118_ea51400c42c8b72137ec73f82b662096.exe 30 PID 768 wrote to memory of 3060 768 JaffaCakes118_ea51400c42c8b72137ec73f82b662096.exe 30 PID 3060 wrote to memory of 2216 3060 WaterMark.exe 31 PID 3060 wrote to memory of 2216 3060 WaterMark.exe 31 PID 3060 wrote to memory of 2216 3060 WaterMark.exe 31 PID 3060 wrote to memory of 2216 3060 WaterMark.exe 31 PID 3060 wrote to memory of 2216 3060 WaterMark.exe 31 PID 3060 wrote to memory of 2216 3060 WaterMark.exe 31 PID 3060 wrote to memory of 2216 3060 WaterMark.exe 31 PID 3060 wrote to memory of 2216 3060 WaterMark.exe 31 PID 3060 wrote to memory of 2216 3060 WaterMark.exe 31 PID 3060 wrote to memory of 2216 3060 WaterMark.exe 31 PID 3060 wrote to memory of 2640 3060 WaterMark.exe 32 PID 3060 wrote to memory of 2640 3060 WaterMark.exe 32 PID 3060 wrote to memory of 2640 3060 WaterMark.exe 32 PID 3060 wrote to memory of 2640 3060 WaterMark.exe 32 PID 3060 wrote to memory of 2640 3060 WaterMark.exe 32 PID 3060 wrote to memory of 2640 3060 WaterMark.exe 32 PID 3060 wrote to memory of 2640 3060 WaterMark.exe 32 PID 3060 wrote to memory of 2640 3060 WaterMark.exe 32 PID 3060 wrote to memory of 2640 3060 WaterMark.exe 32 PID 3060 wrote to memory of 2640 3060 WaterMark.exe 32 PID 2640 wrote to memory of 256 2640 svchost.exe 1 PID 2640 wrote to memory of 256 2640 svchost.exe 1 PID 2640 wrote to memory of 256 2640 svchost.exe 1 PID 2640 wrote to memory of 256 2640 svchost.exe 1 PID 2640 wrote to memory of 256 2640 svchost.exe 1 PID 2640 wrote to memory of 336 2640 svchost.exe 2 PID 2640 wrote to memory of 336 2640 svchost.exe 2 PID 2640 wrote to memory of 336 2640 svchost.exe 2 PID 2640 wrote to memory of 336 2640 svchost.exe 2 PID 2640 wrote to memory of 336 2640 svchost.exe 2 PID 2640 wrote to memory of 384 2640 svchost.exe 3 PID 2640 wrote to memory of 384 2640 svchost.exe 3 PID 2640 wrote to memory of 384 2640 svchost.exe 3 PID 2640 wrote to memory of 384 2640 svchost.exe 3 PID 2640 wrote to memory of 384 2640 svchost.exe 3 PID 2640 wrote to memory of 396 2640 svchost.exe 4 PID 2640 wrote to memory of 396 2640 svchost.exe 4 PID 2640 wrote to memory of 396 2640 svchost.exe 4 PID 2640 wrote to memory of 396 2640 svchost.exe 4 PID 2640 wrote to memory of 396 2640 svchost.exe 4 PID 2640 wrote to memory of 432 2640 svchost.exe 5 PID 2640 wrote to memory of 432 2640 svchost.exe 5 PID 2640 wrote to memory of 432 2640 svchost.exe 5 PID 2640 wrote to memory of 432 2640 svchost.exe 5 PID 2640 wrote to memory of 432 2640 svchost.exe 5 PID 2640 wrote to memory of 480 2640 svchost.exe 6 PID 2640 wrote to memory of 480 2640 svchost.exe 6 PID 2640 wrote to memory of 480 2640 svchost.exe 6 PID 2640 wrote to memory of 480 2640 svchost.exe 6 PID 2640 wrote to memory of 480 2640 svchost.exe 6 PID 2640 wrote to memory of 488 2640 svchost.exe 7 PID 2640 wrote to memory of 488 2640 svchost.exe 7 PID 2640 wrote to memory of 488 2640 svchost.exe 7 PID 2640 wrote to memory of 488 2640 svchost.exe 7 PID 2640 wrote to memory of 488 2640 svchost.exe 7 PID 2640 wrote to memory of 496 2640 svchost.exe 8 PID 2640 wrote to memory of 496 2640 svchost.exe 8 PID 2640 wrote to memory of 496 2640 svchost.exe 8 PID 2640 wrote to memory of 496 2640 svchost.exe 8 PID 2640 wrote to memory of 496 2640 svchost.exe 8
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:600
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1524
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1672
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:680
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:756
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:816
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1164
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:856
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:3032
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:964
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:112
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:296
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1068
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1104
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:872
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:1952
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2452
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:488
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:496
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:396
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ea51400c42c8b72137ec73f82b662096.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ea51400c42c8b72137ec73f82b662096.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2216
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize245KB
MD5546bebe591c868d882d33585fc8c186e
SHA13350e506a0e8fb48e3d4d685cd60463654ff5b40
SHA256bb9c0a4bf865e7f9a3c761de758ebec060dd9baf7c7d7533c98d82ce59902437
SHA512d97015e53e41a9b2249b7c0261df7dd518d209b517a7103e621f7a7fc3cf7115310fdbc7c664f501700c430bcdcb986f95e17614c8ba881fd1cf4f78df543885
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize241KB
MD5afcfea4413cd840475858b4e62ff356a
SHA144bf6b51c7bcf685f75e8ad64624e18c2ae65711
SHA2561afedf91b53807724d60df4d7a902fb4ca8f7171961b64633ac9003ea98afc83
SHA512c9786289e6859aed415f5e12c2942656250bd8f8c31b6d0afbcc1bffeaf7d4778f54973a9bf0ec6615535175203fde1ffc2c62718ea9a2297e154bb937b96017
-
Filesize
116KB
MD5ea51400c42c8b72137ec73f82b662096
SHA166aac478e6ad8670f632411a110e073eb9e3387d
SHA25625b61913dd908b2ad3953638404c2ed3e762ea80a87ca3c93859c589cfb109b3
SHA5125ba150487aaa124307ee7eedd53f18bbc2898b42ac33b91e1fa96b54a7482b84ff44e1accb46f244f4f1d0bf57b9e924c3aeb2a2dcf05b92e2f9ebf5c620687b