Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2024, 00:30 UTC
Static task
static1
Behavioral task
behavioral1
Sample
cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe
-
Size
498KB
-
MD5
cfccfbe9ab6445941858985f799b3394
-
SHA1
14ccd9f95a53370c8b63740b81490d3edf6c3948
-
SHA256
810e9b511db1b633000325ef4cc4d53e8f206b2fd10aab9d7a0c94d9fc5b6b74
-
SHA512
06f13b54fd1900cc82c5fc0dba692fa29c0127ed4a5aede3c7a437e1cbc603eb9a8ce7dab1d9cf2391a2c4a823f98165aa36b187f25385f8ee0b6a3d5a58c4ea
-
SSDEEP
12288:Hm9tXxVmqzFDsxT3wxaHWBlzjqK/9g+FZkoUMFb4qevW1+EaoqYVr:0loTgzFVg+FnX9jevW1+Eaov9
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023ba4-12.dat family_ardamax -
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List Cod4Bot.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile Cod4Bot.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications Cod4Bot.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\Cod4Bot.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Cod4Bot.exe:*:Enabled:Microsot Windows Explorer" Cod4Bot.exe -
Detected Nirsoft tools 6 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/files/0x000a000000023ba5-22.dat Nirsoft behavioral2/files/0x000b000000023ba6-49.dat Nirsoft behavioral2/memory/3696-62-0x0000000000400000-0x000000000041D000-memory.dmp Nirsoft behavioral2/memory/892-71-0x0000000000400000-0x0000000000423000-memory.dmp Nirsoft behavioral2/files/0x000a000000023baa-78.dat Nirsoft behavioral2/memory/2452-101-0x0000000000400000-0x0000000000419000-memory.dmp Nirsoft -
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/files/0x000a000000023ba5-22.dat MailPassView behavioral2/memory/3696-62-0x0000000000400000-0x000000000041D000-memory.dmp MailPassView -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe -
Executes dropped EXE 8 IoCs
pid Process 1696 system32XDMB.exe 3572 Cod4Bot.exe 3980 pspv.exe 3696 mailpv.exe 892 mspass.exe 1348 dialupass2.exe 2452 netpass.exe 3868 FF.exe -
Loads dropped DLL 10 IoCs
pid Process 2968 cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe 1696 system32XDMB.exe 3572 Cod4Bot.exe 1696 system32XDMB.exe 1696 system32XDMB.exe 3572 Cod4Bot.exe 3572 Cod4Bot.exe 1348 dialupass2.exe 1348 dialupass2.exe 1348 dialupass2.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts mailpv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32XDMB Agent = "C:\\Windows\\system32XDMB.exe" system32XDMB.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral2/files/0x000c000000023ba7-57.dat upx behavioral2/memory/3696-58-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3696-62-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/files/0x000b000000023b9d-68.dat upx behavioral2/memory/892-71-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x000d000000023ba9-94.dat upx behavioral2/memory/2452-95-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/2452-101-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\system32XDMB.001 cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe File created C:\Windows\system32XDMB.006 cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe File created C:\Windows\system32XDMB.007 cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe File created C:\Windows\system32XDMB.exe cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32XDMB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cod4Bot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pspv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialupass2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netpass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mailpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mspass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FF.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 892 mspass.exe 892 mspass.exe 2452 netpass.exe 2452 netpass.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1696 system32XDMB.exe Token: SeIncBasePriorityPrivilege 1696 system32XDMB.exe Token: SeDebugPrivilege 892 mspass.exe Token: SeDebugPrivilege 2452 netpass.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3572 Cod4Bot.exe 1696 system32XDMB.exe 1696 system32XDMB.exe 1696 system32XDMB.exe 1696 system32XDMB.exe 3572 Cod4Bot.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2968 wrote to memory of 1696 2968 cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe 82 PID 2968 wrote to memory of 1696 2968 cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe 82 PID 2968 wrote to memory of 1696 2968 cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe 82 PID 2968 wrote to memory of 3572 2968 cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe 83 PID 2968 wrote to memory of 3572 2968 cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe 83 PID 2968 wrote to memory of 3572 2968 cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe 83 PID 3572 wrote to memory of 3980 3572 Cod4Bot.exe 84 PID 3572 wrote to memory of 3980 3572 Cod4Bot.exe 84 PID 3572 wrote to memory of 3980 3572 Cod4Bot.exe 84 PID 3572 wrote to memory of 3696 3572 Cod4Bot.exe 85 PID 3572 wrote to memory of 3696 3572 Cod4Bot.exe 85 PID 3572 wrote to memory of 3696 3572 Cod4Bot.exe 85 PID 3572 wrote to memory of 892 3572 Cod4Bot.exe 86 PID 3572 wrote to memory of 892 3572 Cod4Bot.exe 86 PID 3572 wrote to memory of 892 3572 Cod4Bot.exe 86 PID 3572 wrote to memory of 1348 3572 Cod4Bot.exe 87 PID 3572 wrote to memory of 1348 3572 Cod4Bot.exe 87 PID 3572 wrote to memory of 1348 3572 Cod4Bot.exe 87 PID 3572 wrote to memory of 2452 3572 Cod4Bot.exe 88 PID 3572 wrote to memory of 2452 3572 Cod4Bot.exe 88 PID 3572 wrote to memory of 2452 3572 Cod4Bot.exe 88 PID 3572 wrote to memory of 3868 3572 Cod4Bot.exe 89 PID 3572 wrote to memory of 3868 3572 Cod4Bot.exe 89 PID 3572 wrote to memory of 3868 3572 Cod4Bot.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cfccfbe9ab6445941858985f799b3394_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32XDMB.exe"C:\Windows\system32XDMB.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\Cod4Bot.exe"C:\Users\Admin\AppData\Local\Temp\Cod4Bot.exe"2⤵
- Modifies firewall policy service
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\pspv.exe"C:\Users\Admin\AppData\Local\Temp\pspv.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\Protected Storage Passwords.htm""3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3980
-
-
C:\Users\Admin\AppData\Local\Temp\mailpv.exe"C:\Users\Admin\AppData\Local\Temp\mailpv.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\Mail Passwords.htm""3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\mspass.exe"C:\Users\Admin\AppData\Local\Temp\mspass.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\Messengers Passwords.htm""3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\dialupass2.exe"C:\Users\Admin\AppData\Local\Temp\dialupass2.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\DialUp Passwords.htm""3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\netpass.exe"C:\Users\Admin\AppData\Local\Temp\netpass.exe" /shtml "C:\Users\Admin\AppData\Local\Temp\Network Passwords.htm""3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\FF.exeC:\Users\Admin\AppData\Local\Temp\FF.exe "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3868
-
-
Network
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestglobaniom.redirectme.netIN AResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.163.245.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request195.22.101.95.in-addr.arpaIN PTRResponse195.22.101.95.in-addr.arpaIN PTRa95-101-22-195deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request85.49.80.91.in-addr.arpaIN PTRResponse
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
70 B 130 B 1 1
DNS Request
globaniom.redirectme.net
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
56.163.245.4.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
195.22.101.95.in-addr.arpa
-
70 B 145 B 1 1
DNS Request
85.49.80.91.in-addr.arpa
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5d9e02f226fc338d14df200ba9a700625
SHA1414f134a16a309b31e418ed9e08c0c48aaf6e2bc
SHA2568165757efb79acceb9fd0bfae6b2c19b8f087cc0461abb17941d460dbdf2e260
SHA51213c73381602fe2593312d41ab4bc5cd5f922ac651f9e71e3fe3c58e7f0c5c73ecc9d79d61ec46f33a0a81cf73373421eeb510bd99650c0f53af30974ed61b8ca
-
Filesize
388KB
MD5b15b2b263ef15f5e78c02cf35c575576
SHA19fc4f74b102fafc0ce082f17a02b5eddaea60922
SHA25694aac2eca506edf021e28db99fbe4198b254501b050419bb526354327dc73cad
SHA512403e6771a60038d14fd1c5265f9b1df4ce1f247d5ff89f17be3ef46fe9b2c21a1c94e3e48c20f4522776f8bef966c6a9800fc2249ac9b71ba8968104f7233f56
-
Filesize
462B
MD5fdd01f6d5ec3537bfbcab43b324585f8
SHA18b823c8c5aaf09d4a2ac5279361521e5c654087d
SHA256de8fcd3c1fd421ba39962ad8f4547e9d6da55e120f9634f35db37e3af379f190
SHA512639e2d81f696a0bcf865d0041906915fc33039e183691c9e7bce9c1f096f9b3842d413513f28083ee8cc5748c7d7805f67715589ec0366a53c2886ce89949395
-
Filesize
40KB
MD57701a23d89ceb84b58eb3e527ad08af9
SHA19544c9dde88d4f2ec6d94408c68d411d35e17de3
SHA2561b333043fad01bc85a8d91d840eca642a414c8757222ba3ff9a9a6a4a07f5ef0
SHA51261997d04c40bb07160630bd8226c3822017e99d4f897d443b961c5848c0403cab0d27c23a463de722879ee1ca5cb48e8419284b2b5606312c3a8a6e65ff25bac
-
Filesize
336B
MD525fb4c842c7e30f6ad092986b30b103a
SHA1cc655df179645e51102b3d8bde8a46bcd2135c67
SHA256f461c35280314981fae8fab1eed0a44571b7597f8a13804b767e7688a2ef2c32
SHA51202bc56f2038742be15176d9c3e47aa1e0391444d029de8ae518c3c7235eaee14eb4f7ccac3d4bb521e043806226aa90d91936c8ac4a7b2d60db99d20b3213e32
-
Filesize
317B
MD533f76e1392fb33e7b971f2abdd92253f
SHA16a1af8d3db013b3e99fed379aa8c8edf61243548
SHA2560bb24b498f828782dbcd8abe7ec1bd53ba0c9b62218f326d3d8af9a73bdd9ec7
SHA51202bfecef09b6ae4c803ef7183f0865aaa169f709b7afd02382ce41934fdc7881939212df2aa1466c45cafb60f962606d25662b16509e25d81756ae3db61a5674
-
Filesize
636B
MD5d7237ce4faa3da0ecadebd0631a37090
SHA1bac8b5dde291d7b1e018dd5e623cc3caf7991ee2
SHA256935b7d73e4777244016a9e0da4e39ba8d909d356dea6a902eaf4aec720576df5
SHA5122486622203e1a1797216b0777ba5c21cbe4a8e3c5dbb70b8fc91bec68742bd860d1780c2533eddb8501d9e7b5e646e366d87c1f755d6612c812ade29626c1786
-
Filesize
327B
MD53ad04fdbe1e605527f6bd2f1cf584557
SHA146d1d2c15d1ec4351c6298dd9ead633b435df3ec
SHA2560e16624dd8b2ae6f391fb36dd65f6c674f748bc4cfb4c8d684a66819ed50c240
SHA512891b33482e5f4c71759680b64080a39ed90f20d13c153cc7d32edfa0f1a0670cac3904a7dfb1cdfa27ce5b84715208fecedc4ff485250f39140e975d23d1a96a
-
Filesize
75KB
MD5d4292602e6d519e75ca60db02cbe0a43
SHA18cf54e9e5e3c7b904c8c796a9e2de38b988e747a
SHA256fc1bc82ad3fb64775ce9abd481f58efd58c7b0a8e017efe6b52067c578919a51
SHA512c4801bb034a8a8794546c73cbfebce220a2486675abd3e825f36665deaf28e4213aa1932778e27492949e1c68e4b61f6f9d4efcaaa58e7d62c3c728f277e7922
-
Filesize
46KB
MD56f2c09baafc0d31f1ce0994f8f2d5048
SHA184573202cf87bbc995bb43be4b5cb41434aab059
SHA2563098abdb835e9b266dad36173c20572edc44cd21501607622eb548787b3d54f5
SHA51274bc6ab413d493d5210f7e7980bf2a020c3fed2fd2bafdb6563d041840550410db68bdf267576cacc5bc677f490f8d9189148ea87301777b56a9dd4ef1d749ae
-
Filesize
58KB
MD57cfb71efaa32f1fb654517aa1f4812f2
SHA1b603236f708f15ac037ab2ddaf794c643482a873
SHA256c2af90d91be1fee339be6e1fd60ce293e72cf6231b25dc29b67648fc3d046322
SHA5125a6c1be82cc5f1f4de519bbfb7dc24adaa60493a8e8310be74803c3f0d98451345e6fbe8fdaa3da480c687d53dcf2b01d54ce96a2c519f3539e4be9465cdd636
-
Filesize
37KB
MD522f0f0aa39ff8dbcd3973c58ce7cc2c6
SHA1f0ad2f34164702711fd73bdb6c2d870e0c8ab9f8
SHA256aeecd4e8fc92ae0aa8d915d775aa872a7c4487420aabed7b6e27a762572eae92
SHA5129387da7e7aa9ecb41bc096edd70fbaca8b398de318f98972dee2765d311502b687f2c364ff0ae20a2e60d568bdaf7bacb34e73b6dec0a9edf97b2a6366c478b0
-
Filesize
51KB
MD535861f4ea9a8ecb6c357bdb91b7df804
SHA1836cb49c8d08d5e305ab8976f653b97f1edba245
SHA25664788b6f74875aed53ca80669b06f407e132d7be49586925dbb3dcde56cbca9c
SHA5120fdfe62c86c8601bb98991149eea51ddf91b812ad2c2d45e53aaf1f36a09d00aaf02fc3d183179cf5367fda09d6f62d36c0187da2dfa5e08df4c07cf634690be
-
Filesize
404B
MD52f06d7370e0c512f891c19a2974c8521
SHA1ac9ce73fcec8e58426fe5c3194ec025772e95b9c
SHA256f3ce4bb0022a82ae742edecce267d7501d58c8333f402f4e72bb55be64697d3e
SHA512c9946b3158ef35b43317e5a0652199364e777af51f07a9dec1f82ff605fb624f0c982a573788ac5533caf45f21702774af49f6a791e3757691c60abb3a48c3d8
-
Filesize
7KB
MD532dd7b4bc8b6f290b0ece3cc1c011c96
SHA1b979683868b399c6a6204ebaed9fc9c784a0429a
SHA2566dcce9bbba5c2de47eea3abf7597a9c4fb2e4d358efc3752fa65c169cccfa2a1
SHA5129e0d720799fe816f7d09c8a722b762203b6f12a8625c1c93cd640219ecc35969bd641b4d9e6dc04ab6f95ceb73235a438eb7d48ee9402118db3618b5760551ea
-
Filesize
5KB
MD5e8155b68775ed29590e14df80fdc0e9f
SHA1ed449da02e648a524004c265f3c37496d2f07f1f
SHA256b39ba894b0a9a3201461ddd9ee9b297928e793dff221a47f019e75c11df631f3
SHA512b14e00c46cf9bed0aca0f85775f624ff064f2d2afe1fa68b61bee5729db73cf9a8eced669c52d7cbb9504ff1b369a9a16a0f36c71a70c13c0bd1eaf5e07ccc11
-
Filesize
471KB
MD53c06bbc025b61d2182ef5573f2852bda
SHA1ebc1464c00b13fb5b3f80a59c80b595020e1fe7c
SHA256e7f64e7215284cdeb8ef1eba28733f7aeae7f6977f82809d8de1e76a2e249085
SHA5129d839ada211b85fc1efb1fe7bb3ce66fcf0e8069221d958234649c2ac5dc0f1bd06f1a016f9c727077af36fb46cac5409be9c8a8201d17f689c6b473aa01acdc