Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2025, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe
-
Size
95KB
-
MD5
13b7962a5fe685f36e825ee6ad0c4852
-
SHA1
5307c0380dd37c2a10b7dd6de8e33a9504beb70b
-
SHA256
1427b7a98073f65fc4c995fd04853bee9b3dd41cc26e0cb9ea5fb8cd8c7dd65f
-
SHA512
5144a573534957f94426751eab0f8a8df2a16808b782f2d8c4229fc7f33b4d55be25924460c3f0d2b77a5ff3fa592582f23391689b3ced0f8c3874495cb5b2c6
-
SSDEEP
768:206R0UKzOgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw9Y:UR0vxn3Pc0LCH9MtbvabUDzJYWu3B
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 724 WaterMark.exe -
resource yara_rule behavioral2/memory/4476-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4476-10-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4476-11-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/724-29-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/724-26-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/724-23-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/724-22-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral2/memory/4476-5-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4476-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4476-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/724-33-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/724-37-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/724-38-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px7791.tmp JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1000 4488 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2001496530" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31155475" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1993371557" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2001496530" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1993371557" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31155475" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31155475" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A24A46B3-D106-11EF-B9B6-D2BD7E71DA05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443466164" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31155475" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1992746015" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1992746015" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31155475" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31155475" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A247E505-D106-11EF-B9B6-D2BD7E71DA05} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 724 WaterMark.exe 724 WaterMark.exe 724 WaterMark.exe 724 WaterMark.exe 724 WaterMark.exe 724 WaterMark.exe 724 WaterMark.exe 724 WaterMark.exe 724 WaterMark.exe 724 WaterMark.exe 724 WaterMark.exe 724 WaterMark.exe 724 WaterMark.exe 724 WaterMark.exe 724 WaterMark.exe 724 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 724 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3436 iexplore.exe 3348 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3436 iexplore.exe 3436 iexplore.exe 3348 iexplore.exe 3348 iexplore.exe 944 IEXPLORE.EXE 944 IEXPLORE.EXE 3120 IEXPLORE.EXE 3120 IEXPLORE.EXE 944 IEXPLORE.EXE 944 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4476 JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe 724 WaterMark.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4476 wrote to memory of 724 4476 JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe 83 PID 4476 wrote to memory of 724 4476 JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe 83 PID 4476 wrote to memory of 724 4476 JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe 83 PID 724 wrote to memory of 4488 724 WaterMark.exe 84 PID 724 wrote to memory of 4488 724 WaterMark.exe 84 PID 724 wrote to memory of 4488 724 WaterMark.exe 84 PID 724 wrote to memory of 4488 724 WaterMark.exe 84 PID 724 wrote to memory of 4488 724 WaterMark.exe 84 PID 724 wrote to memory of 4488 724 WaterMark.exe 84 PID 724 wrote to memory of 4488 724 WaterMark.exe 84 PID 724 wrote to memory of 4488 724 WaterMark.exe 84 PID 724 wrote to memory of 4488 724 WaterMark.exe 84 PID 724 wrote to memory of 3348 724 WaterMark.exe 89 PID 724 wrote to memory of 3348 724 WaterMark.exe 89 PID 724 wrote to memory of 3436 724 WaterMark.exe 90 PID 724 wrote to memory of 3436 724 WaterMark.exe 90 PID 3348 wrote to memory of 944 3348 iexplore.exe 93 PID 3348 wrote to memory of 944 3348 iexplore.exe 93 PID 3348 wrote to memory of 944 3348 iexplore.exe 93 PID 3436 wrote to memory of 3120 3436 iexplore.exe 92 PID 3436 wrote to memory of 3120 3436 iexplore.exe 92 PID 3436 wrote to memory of 3120 3436 iexplore.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_13b7962a5fe685f36e825ee6ad0c4852.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 2044⤵
- Program crash
PID:1000
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3348 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:944
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3436 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3120
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4488 -ip 44881⤵PID:452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD513b7962a5fe685f36e825ee6ad0c4852
SHA15307c0380dd37c2a10b7dd6de8e33a9504beb70b
SHA2561427b7a98073f65fc4c995fd04853bee9b3dd41cc26e0cb9ea5fb8cd8c7dd65f
SHA5125144a573534957f94426751eab0f8a8df2a16808b782f2d8c4229fc7f33b4d55be25924460c3f0d2b77a5ff3fa592582f23391689b3ced0f8c3874495cb5b2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5975df3dbca02c4223ad98b4405ec0cd8
SHA162c3b5b2d32df9cedede3d746956a999d34beff1
SHA25687d1e303201f45a5b0080b4580575bb564446751cafe9da1e8ce11a9c6a842fd
SHA5121277f93b24c89c39cee767c05e3e450da71aa5bade2fcc2559ef39c3b747c3db491488e63e8d21911e668885308d717fb7d47e2b3a70ff24b0a7250b5f671417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5514be361a1c5b0f79e436ed0d803cc39
SHA19e40ce1d06edc236c639119653230876c611e51c
SHA256789fa40b4f6ecb4a924655557ab1ad139d3152cfcb0c9eb0de9e63c057bb4231
SHA512c7cade8f80e4cb5c0a9a57ee766246bc06ad76039bd7134ba1703bd9b1bf5d55045bf6102b37670457d8f2be9d90077f39963a4cfeba1ac253af949751b52fd9
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A247E505-D106-11EF-B9B6-D2BD7E71DA05}.dat
Filesize3KB
MD5f101e257500d440cf93066e5e5b2763d
SHA18ef5d5c07e1b84e9ad1e5b1b01b6c5ea1e5b858d
SHA256ce10edd06a815ec243e5439c0ff0c9d3cace413edc7701342d2856237e49eb6a
SHA51298daa9bc9c5517d6c3830291c8651a742b28d5809696031aa61e474bb86a4538bdb191c7da18ed65648b0c765fb10f4b3f210576cc17ebc3abe150f6a956d7c8
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A24A46B3-D106-11EF-B9B6-D2BD7E71DA05}.dat
Filesize5KB
MD546a6c1da5b0da226a28db42ba9efb479
SHA195dbfe945b1862d5802777cc0f7ef36ad212fdb3
SHA25608bdfe1d1a9d7dfe35b6d584f913cc1c2a8c1983a0a3df40b5c17442edc7b76c
SHA5125290ebb8df9754a190881bab9a4736205e01b0a79308618226d2d3b7dae3452b5fe1206ab627860250c8fb4f21195356f46810ea5c313648341132fefc131196
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee