Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2025, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_15b317b7b4bde319bba84e021c5e7897.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_15b317b7b4bde319bba84e021c5e7897.exe
-
Size
95KB
-
MD5
15b317b7b4bde319bba84e021c5e7897
-
SHA1
5b4af70ae003fcf604e8192f63a72cc865ceb24c
-
SHA256
18954b67aecb49ba34b2b6a94e5e70d6dbd5d004afdc0794384f11f48c234440
-
SHA512
8f2462d1d10b7ba6b54ba4ac4f099362a5cff770e585e5091d3b6959a60487834053ddac0c2ccdff095ffd060e5b63011f7559902ceca2127af8bbdf1ae2c634
-
SSDEEP
768:106R0UKzOgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw9Y:jR0vxn3Pc0LCH9MtbvabUDzJYWu3B
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 3988 WaterMark.exe -
resource yara_rule behavioral2/memory/3752-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3752-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3988-27-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3988-24-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3752-12-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3752-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3752-5-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3752-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3752-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3988-31-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/3988-32-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3988-35-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3988-39-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxCD72.tmp JaffaCakes118_15b317b7b4bde319bba84e021c5e7897.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_15b317b7b4bde319bba84e021c5e7897.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_15b317b7b4bde319bba84e021c5e7897.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1056 1988 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_15b317b7b4bde319bba84e021c5e7897.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{68C62A38-D115-11EF-9361-6AACA39217E0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31155490" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31155490" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31155490" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443472517" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1033095125" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31155490" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1033095125" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1033095125" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1057626358" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{68FF5EA2-D115-11EF-9361-6AACA39217E0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1033095125" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31155490" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1057626358" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31155490" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3988 WaterMark.exe 3988 WaterMark.exe 3988 WaterMark.exe 3988 WaterMark.exe 3988 WaterMark.exe 3988 WaterMark.exe 3988 WaterMark.exe 3988 WaterMark.exe 3988 WaterMark.exe 3988 WaterMark.exe 3988 WaterMark.exe 3988 WaterMark.exe 3988 WaterMark.exe 3988 WaterMark.exe 3988 WaterMark.exe 3988 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3988 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4844 iexplore.exe 2452 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2452 iexplore.exe 2452 iexplore.exe 4844 iexplore.exe 4844 iexplore.exe 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3752 JaffaCakes118_15b317b7b4bde319bba84e021c5e7897.exe 3988 WaterMark.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3752 wrote to memory of 3988 3752 JaffaCakes118_15b317b7b4bde319bba84e021c5e7897.exe 82 PID 3752 wrote to memory of 3988 3752 JaffaCakes118_15b317b7b4bde319bba84e021c5e7897.exe 82 PID 3752 wrote to memory of 3988 3752 JaffaCakes118_15b317b7b4bde319bba84e021c5e7897.exe 82 PID 3988 wrote to memory of 1988 3988 WaterMark.exe 83 PID 3988 wrote to memory of 1988 3988 WaterMark.exe 83 PID 3988 wrote to memory of 1988 3988 WaterMark.exe 83 PID 3988 wrote to memory of 1988 3988 WaterMark.exe 83 PID 3988 wrote to memory of 1988 3988 WaterMark.exe 83 PID 3988 wrote to memory of 1988 3988 WaterMark.exe 83 PID 3988 wrote to memory of 1988 3988 WaterMark.exe 83 PID 3988 wrote to memory of 1988 3988 WaterMark.exe 83 PID 3988 wrote to memory of 1988 3988 WaterMark.exe 83 PID 3988 wrote to memory of 2452 3988 WaterMark.exe 87 PID 3988 wrote to memory of 2452 3988 WaterMark.exe 87 PID 3988 wrote to memory of 4844 3988 WaterMark.exe 88 PID 3988 wrote to memory of 4844 3988 WaterMark.exe 88 PID 2452 wrote to memory of 1984 2452 iexplore.exe 89 PID 2452 wrote to memory of 1984 2452 iexplore.exe 89 PID 2452 wrote to memory of 1984 2452 iexplore.exe 89 PID 4844 wrote to memory of 1972 4844 iexplore.exe 90 PID 4844 wrote to memory of 1972 4844 iexplore.exe 90 PID 4844 wrote to memory of 1972 4844 iexplore.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_15b317b7b4bde319bba84e021c5e7897.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_15b317b7b4bde319bba84e021c5e7897.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 2044⤵
- Program crash
PID:1056
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1984
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4844 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1972
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1988 -ip 19881⤵PID:2484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD515b317b7b4bde319bba84e021c5e7897
SHA15b4af70ae003fcf604e8192f63a72cc865ceb24c
SHA25618954b67aecb49ba34b2b6a94e5e70d6dbd5d004afdc0794384f11f48c234440
SHA5128f2462d1d10b7ba6b54ba4ac4f099362a5cff770e585e5091d3b6959a60487834053ddac0c2ccdff095ffd060e5b63011f7559902ceca2127af8bbdf1ae2c634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5975df3dbca02c4223ad98b4405ec0cd8
SHA162c3b5b2d32df9cedede3d746956a999d34beff1
SHA25687d1e303201f45a5b0080b4580575bb564446751cafe9da1e8ce11a9c6a842fd
SHA5121277f93b24c89c39cee767c05e3e450da71aa5bade2fcc2559ef39c3b747c3db491488e63e8d21911e668885308d717fb7d47e2b3a70ff24b0a7250b5f671417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD50fe4ca06828d0dd6897127da803daebc
SHA179bd2e62b40bce3eb1dfa8d9ae62b32be45e3171
SHA256786541df38af84f48d30ab86f6954771c9c80843aa2767205673d44d5fc95d8a
SHA512ae6323878f6c41da5ae09de2f807fdcca5701165c28e7087285e1eb61639e497705707f2bf0a840958d6b8cf3716adb571c458eefe2f02f19b5b19afc540f725
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{68C62A38-D115-11EF-9361-6AACA39217E0}.dat
Filesize5KB
MD5622d7eb09490ffaaf2372427d2d0451c
SHA1fd54c213c43578807e5e765cbfef576d4331f651
SHA2567a3b296cfd38de9851b44e12825d978bf095d56677591895913a9a6a5a82dc50
SHA5125d218762b71a22aeaec74ce2fe6a5c7fc9db5d8d4af069afe726932a8037cda68b99c271363a6d9955d4f8ac2d5edbfcde6f301b41f0f9fb2830ba8096f9d954
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{68FF5EA2-D115-11EF-9361-6AACA39217E0}.dat
Filesize3KB
MD5339493c2fc1fd00cfda588ecd5254ab0
SHA1f9ecdc88372e8a662eaa804d96668479226645d6
SHA25616100009623e2eaad5fc2d3b1505723b51784a269d665c81bc962ed21e4b8c7c
SHA512ca9da9ce1b7663565b329809258ac0dc79e831123caca413a909a5f390867a736357e2f92e430d76f70b51432396b4c7ffccb81a972ee34bbf5e053824ac23f0
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee