Analysis
-
max time kernel
15s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-04-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
e39a5fa4c76264ae7d7343e41675a636_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e39a5fa4c76264ae7d7343e41675a636_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240221-en
General
-
Target
e39a5fa4c76264ae7d7343e41675a636_JaffaCakes118.exe
-
Size
2.6MB
-
MD5
e39a5fa4c76264ae7d7343e41675a636
-
SHA1
f32530047d0fa1bbdc009c56b2e24a11866370c9
-
SHA256
d72dd5663947fc7e1bd8903030b3e2fd551d8d938fdc6417d8513a1c4cc49702
-
SHA512
fbcc846582ea34c97d83accfed1f88fb3259d20ca7e61ab46e8da3f08e6d54bff61000919ed0c1b06f484e1109c654ceb7a946c0ec134a0e103677a421deed5b
-
SSDEEP
49152:EgDym6jbrFi6tFbcAOtwUxtZcaTcDGBpbaJVyYD6gbbp+zHT8d:JDymKklAywUxtJTcDGBxaJVyIjbQC
Malware Config
Extracted
nullmixer
http://sokiran.xyz/
Extracted
vidar
39.7
933
https://shpak125.tumblr.com/
-
profile_id
933
Extracted
smokeloader
pub5
Extracted
smokeloader
2020
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1136 1536 rUNdlL32.eXe 111 -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 3 IoCs
resource yara_rule behavioral2/memory/2748-120-0x0000000000400000-0x00000000008F9000-memory.dmp family_vidar behavioral2/memory/2748-117-0x0000000002690000-0x000000000272D000-memory.dmp family_vidar behavioral2/memory/2748-133-0x0000000000400000-0x00000000008F9000-memory.dmp family_vidar -
resource yara_rule behavioral2/files/0x000700000002321c-40.dat aspack_v212_v242 behavioral2/files/0x000700000002321a-55.dat aspack_v212_v242 behavioral2/files/0x0007000000023217-50.dat aspack_v212_v242 behavioral2/files/0x0007000000023218-51.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation e39a5fa4c76264ae7d7343e41675a636_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation sonia_1.exe -
Executes dropped EXE 10 IoCs
pid Process 992 setup_installer.exe 4088 setup_install.exe 4860 sonia_1.exe 3568 sonia_2.exe 740 sonia_5.exe 1844 sonia_4.exe 2748 sonia_3.exe 2608 sonia_6.exe 2136 sonia_7.exe 2220 sonia_1.exe -
Loads dropped DLL 7 IoCs
pid Process 4088 setup_install.exe 4088 setup_install.exe 4088 setup_install.exe 4088 setup_install.exe 4088 setup_install.exe 3568 sonia_2.exe 212 rundll32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 24 iplogger.org 25 iplogger.org 26 iplogger.org -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ipinfo.io 17 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3748 4088 WerFault.exe 89 4224 212 WerFault.exe 113 5044 2748 WerFault.exe 104 2528 3568 WerFault.exe 100 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sonia_2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sonia_2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sonia_2.exe -
Suspicious behavior: EnumeratesProcesses 53 IoCs
pid Process 3568 sonia_2.exe 3568 sonia_2.exe 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found 3464 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3568 sonia_2.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1844 sonia_4.exe Token: SeDebugPrivilege 740 sonia_5.exe Token: SeShutdownPrivilege 3464 Process not Found Token: SeCreatePagefilePrivilege 3464 Process not Found -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 5044 wrote to memory of 992 5044 e39a5fa4c76264ae7d7343e41675a636_JaffaCakes118.exe 88 PID 5044 wrote to memory of 992 5044 e39a5fa4c76264ae7d7343e41675a636_JaffaCakes118.exe 88 PID 5044 wrote to memory of 992 5044 e39a5fa4c76264ae7d7343e41675a636_JaffaCakes118.exe 88 PID 992 wrote to memory of 4088 992 setup_installer.exe 89 PID 992 wrote to memory of 4088 992 setup_installer.exe 89 PID 992 wrote to memory of 4088 992 setup_installer.exe 89 PID 4088 wrote to memory of 656 4088 setup_install.exe 92 PID 4088 wrote to memory of 656 4088 setup_install.exe 92 PID 4088 wrote to memory of 656 4088 setup_install.exe 92 PID 4088 wrote to memory of 2616 4088 setup_install.exe 93 PID 4088 wrote to memory of 2616 4088 setup_install.exe 93 PID 4088 wrote to memory of 2616 4088 setup_install.exe 93 PID 4088 wrote to memory of 4664 4088 setup_install.exe 94 PID 4088 wrote to memory of 4664 4088 setup_install.exe 94 PID 4088 wrote to memory of 4664 4088 setup_install.exe 94 PID 4088 wrote to memory of 4416 4088 setup_install.exe 95 PID 4088 wrote to memory of 4416 4088 setup_install.exe 95 PID 4088 wrote to memory of 4416 4088 setup_install.exe 95 PID 4088 wrote to memory of 3792 4088 setup_install.exe 96 PID 4088 wrote to memory of 3792 4088 setup_install.exe 96 PID 4088 wrote to memory of 3792 4088 setup_install.exe 96 PID 4088 wrote to memory of 1020 4088 setup_install.exe 97 PID 4088 wrote to memory of 1020 4088 setup_install.exe 97 PID 4088 wrote to memory of 1020 4088 setup_install.exe 97 PID 4088 wrote to memory of 4332 4088 setup_install.exe 98 PID 4088 wrote to memory of 4332 4088 setup_install.exe 98 PID 4088 wrote to memory of 4332 4088 setup_install.exe 98 PID 4416 wrote to memory of 1844 4416 cmd.exe 102 PID 4416 wrote to memory of 1844 4416 cmd.exe 102 PID 656 wrote to memory of 4860 656 cmd.exe 103 PID 656 wrote to memory of 4860 656 cmd.exe 103 PID 656 wrote to memory of 4860 656 cmd.exe 103 PID 2616 wrote to memory of 3568 2616 cmd.exe 100 PID 2616 wrote to memory of 3568 2616 cmd.exe 100 PID 2616 wrote to memory of 3568 2616 cmd.exe 100 PID 3792 wrote to memory of 740 3792 cmd.exe 101 PID 3792 wrote to memory of 740 3792 cmd.exe 101 PID 4664 wrote to memory of 2748 4664 cmd.exe 104 PID 4664 wrote to memory of 2748 4664 cmd.exe 104 PID 4664 wrote to memory of 2748 4664 cmd.exe 104 PID 1020 wrote to memory of 2608 1020 cmd.exe 105 PID 1020 wrote to memory of 2608 1020 cmd.exe 105 PID 1020 wrote to memory of 2608 1020 cmd.exe 105 PID 4332 wrote to memory of 2136 4332 cmd.exe 106 PID 4332 wrote to memory of 2136 4332 cmd.exe 106 PID 4860 wrote to memory of 2220 4860 sonia_1.exe 109 PID 4860 wrote to memory of 2220 4860 sonia_1.exe 109 PID 4860 wrote to memory of 2220 4860 sonia_1.exe 109 PID 1136 wrote to memory of 212 1136 rUNdlL32.eXe 113 PID 1136 wrote to memory of 212 1136 rUNdlL32.eXe 113 PID 1136 wrote to memory of 212 1136 rUNdlL32.eXe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\e39a5fa4c76264ae7d7343e41675a636_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e39a5fa4c76264ae7d7343e41675a636_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\7zS0E3A0747\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0E3A0747\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_1.exe4⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\7zS0E3A0747\sonia_1.exesonia_1.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\7zS0E3A0747\sonia_1.exe"C:\Users\Admin\AppData\Local\Temp\7zS0E3A0747\sonia_1.exe" -a6⤵
- Executes dropped EXE
PID:2220
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_2.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\7zS0E3A0747\sonia_2.exesonia_2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3568 -s 3966⤵
- Program crash
PID:2528
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_3.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\7zS0E3A0747\sonia_3.exesonia_3.exe5⤵
- Executes dropped EXE
PID:2748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 10286⤵
- Program crash
PID:5044
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_4.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\7zS0E3A0747\sonia_4.exesonia_4.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_5.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\7zS0E3A0747\sonia_5.exesonia_5.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_6.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\7zS0E3A0747\sonia_6.exesonia_6.exe5⤵
- Executes dropped EXE
PID:2608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sonia_7.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\7zS0E3A0747\sonia_7.exesonia_7.exe5⤵
- Executes dropped EXE
PID:2136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 5404⤵
- Program crash
PID:3748
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4088 -ip 40881⤵PID:2260
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
PID:212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 6003⤵
- Program crash
PID:4224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 212 -ip 2121⤵PID:3200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2748 -ip 27481⤵PID:2272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3568 -ip 35681⤵PID:3892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
290KB
MD5a79a22342247d1376ef3b4b1eb6384b8
SHA175eed603e901eadf313a4be13e6e79e278648c85
SHA256beb34b80c90025587cf08d99d4a58a5160f6ffe7f6b8b81b0e91ebbdc65d9669
SHA512436f01ac7ee4bc3fac8a230c69b16303736dbe92c7fb5d7ab544ce83e0c230fdb02dce8c82647e797070e7e7e5398eb0d328998c3a7b85450221d34cac93d219
-
Filesize
712KB
MD56e43430011784cff369ea5a5ae4b000f
SHA15999859a9ddfcc66e41ff301b0eeb92ef0ce5b9f
SHA256a5ab29e6fc308d1fe9fd056e960d7ccd474e2d22fb6a799d07086ec715a89d9a
SHA51233ef732056182b9ab073d2eacfd71d3f1cb969ee038a19336fb5e0263a4e870742082c756a57010a26e7eab747a2332523d638f2570b8070b933bf957d2dea96
-
Filesize
204KB
MD5ecb2826de42082536ee85e60a4c3c11c
SHA14b86042536e6f46eb4fe2d652b59fb087b4a7a51
SHA25695c73f712482226ae243af49cf9fcbb54ce8e5cd1b3d95f1d352fc47834df582
SHA512ad3b47fbfd0831b4592b5a4038b85274f528328d66c4b25af7ff95d10486a7b7c985ee439b3344334a9a58ab4aee7d8b707f06afd9b8972ae219a1c09dc54a17
-
Filesize
571KB
MD551d8ea24544f0849068486309724edae
SHA1e7782d4a1e9848003c3b83a1258baaec9a1b4cf7
SHA256ee0156f65ea9aea1570425e9bbf2f2c8b26d0d2043edee2e9e9c8adcca8b3108
SHA5123e77a1b9b2bfd403f2089c4ddf2bd82673435487914ca4ed142a352edf1d4032c9f0994c798cafb331534be6fcf28396d44d4afe6084ce28685da19f617e8453
-
Filesize
8KB
MD5d2a0c6939e1be294a7a5a0369438dbc4
SHA1734eca2ed021b9cf19ca501a8ddf0aaa15692464
SHA25609178780a1df7364d0b38580b40ccaa528c3f309bbc0239c98e61d464e8a32f7
SHA51225b4788403e0796958f6700074889cedcfbd7e75192e9386d47e719b38683f2548afe96280371ebfbe82b310589adf623966edbfcb22c89332d46bd6a2827dfa
-
Filesize
117KB
MD5d7f14c5cbe7e0c233ea94def38069b52
SHA1dbba8c3ee5ef8b0547a821dba0e37f75cc512b9d
SHA256979e083ec4eb19f6e1a15c0fed11a9006a6274b1aa55e525eb77a423aeb042c9
SHA51298df322877b1aa56d5df45632d6f0b305829cf633d2d74fde84f37394127162835174bb412561f8c52f5c79ec230a3cb165fcacab7f954108bf2e0f0fdbc36f7
-
Filesize
1.0MB
MD5e44b6cb9e7111de178fbabf3ac1cba76
SHA1b15d8d52864a548c42a331a574828824a65763ff
SHA256c74894fe98864ade516c9e54f2258a23ed451feadfa2de53a7c626385b549b22
SHA51224129e1de024d61bcc23654450f416307be3e7911de2baced47476e02cd7df737ce012f379eb0ea5d84367113619f53d6a80971ccc652a569d6b494150bbb6bf
-
Filesize
244KB
MD50bc56e17cb974ddd06782939dcee2606
SHA1459f61b929c5925327eaa8495bf401cac9e2814f
SHA25676ef9d99c7e37d132f6803ec46f8e2663b1cc282a5d2022946f1598965673fa1
SHA512d260597ac09d2e6109fdbf7e5ca5817b73f3ed690529da067d2dbcde8d35959018837beb3ea7183f6f4ce52b911996d07f0b9712274021cc20bfbcc2c5e7fc1e
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
552KB
MD599ab358c6f267b09d7a596548654a6ba
SHA1d5a643074b69be2281a168983e3f6bef7322f676
SHA256586339f93c9c0eed8a42829ab307f2c5381a636edbcf80df3770c27555034380
SHA512952040785a3c1dcaea613d2e0d46745d5b631785d26de018fd9f85f8485161d056bf67b19c96ae618d35de5d5991a0dd549d749949faea7a2e0f9991a1aa2b2b
-
Filesize
73KB
MD51c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e
-
Filesize
2.6MB
MD58dc372ce5ee18b0b17a2dd684dafe3f4
SHA179797774299499f48b73fd0b33886c3518939be4
SHA2568a1ac8fa80452bdf92dccba3b48a37286a3ccb6f2621209c699f5cb734599fa6
SHA512ac1a88ef641773e0f33ae6f73959e5138a8cdb86a24e2b33b95628831f45ab8914a4c7012150278cea0b8f31781de6a89995837548195f4a7044ff10f7b056b9