Analysis
-
max time kernel
78s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-05-2022 23:37
Static task
static1
Behavioral task
behavioral1
Sample
1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe
Resource
win10v2004-20220414-en
General
-
Target
1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe
-
Size
1.9MB
-
MD5
c6057d2b61be59e1495e001637fadb3d
-
SHA1
e35d65f9dab12340a14512a6174371a547386e41
-
SHA256
1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84
-
SHA512
6d38b061600ecf9c529a816bdf00396d3d33ea670443ae956cb5b6bbe9f98efeb5f7ba1142d8b83a7e26c4454aba57e57967aa64b9d6cded381a113bddbcff43
Malware Config
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 2 IoCs
resource yara_rule behavioral2/memory/4720-133-0x0000000003660000-0x00000000037D0000-memory.dmp family_masslogger behavioral2/memory/4404-148-0x00000000036F0000-0x0000000003860000-memory.dmp family_masslogger -
Executes dropped EXE 2 IoCs
pid Process 4404 win64.exe 1828 Kucnax_winupdate.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation win64.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook win64.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook win64.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook win64.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook win64.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook win64.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook win64.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook win64.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook win64.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook win64.exe Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook win64.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 api.ipify.org 56 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 5000 1828 WerFault.exe 102 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2932 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5044 timeout.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4404 win64.exe 4932 powershell.exe 4932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe Token: SeDebugPrivilege 4404 win64.exe Token: SeDebugPrivilege 4932 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4720 wrote to memory of 388 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 89 PID 4720 wrote to memory of 388 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 89 PID 4720 wrote to memory of 388 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 89 PID 4720 wrote to memory of 4584 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 91 PID 4720 wrote to memory of 4584 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 91 PID 4720 wrote to memory of 4584 4720 1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe 91 PID 388 wrote to memory of 2932 388 cmd.exe 94 PID 388 wrote to memory of 2932 388 cmd.exe 94 PID 388 wrote to memory of 2932 388 cmd.exe 94 PID 4584 wrote to memory of 5044 4584 cmd.exe 93 PID 4584 wrote to memory of 5044 4584 cmd.exe 93 PID 4584 wrote to memory of 5044 4584 cmd.exe 93 PID 4584 wrote to memory of 4404 4584 cmd.exe 97 PID 4584 wrote to memory of 4404 4584 cmd.exe 97 PID 4584 wrote to memory of 4404 4584 cmd.exe 97 PID 4404 wrote to memory of 4932 4404 win64.exe 100 PID 4404 wrote to memory of 4932 4404 win64.exe 100 PID 4404 wrote to memory of 4932 4404 win64.exe 100 PID 4932 wrote to memory of 1828 4932 powershell.exe 102 PID 4932 wrote to memory of 1828 4932 powershell.exe 102 PID 4932 wrote to memory of 1828 4932 powershell.exe 102 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 win64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe"C:\Users\Admin\AppData\Local\Temp\1b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn win64.exe /tr '"C:\Users\Admin\AppData\Roaming\Massive\win64.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn win64.exe /tr '"C:\Users\Admin\AppData\Roaming\Massive\win64.exe"'3⤵
- Creates scheduled task(s)
PID:2932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp2EE.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:5044
-
-
C:\Users\Admin\AppData\Roaming\Massive\win64.exe"C:\Users\Admin\AppData\Roaming\Massive\win64.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4404 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\Kucnax_winupdate.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\Kucnax_winupdate.exe"C:\Users\Admin\AppData\Local\Temp\Kucnax_winupdate.exe"5⤵
- Executes dropped EXE
PID:1828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 3166⤵
- Program crash
PID:5000
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1828 -ip 18281⤵PID:4800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191KB
MD5e74bfa2dabe8eaeb45fcba277e5a34c7
SHA16c96a334026517dbf4f055c7f0827d9d00aba289
SHA25619255f182cbb7e9293b3a1604085085b93f3c5f56a4aeaf10dc33293d56fd62d
SHA5121a6da7113dda490d133b43de92ab44f625407ae5861417a57b8d8f88eb0c938c172f6f1bc9212925cd4e61c7e38658fa771f63ebb7be940e1c8747c42a6e51f8
-
Filesize
191KB
MD5e74bfa2dabe8eaeb45fcba277e5a34c7
SHA16c96a334026517dbf4f055c7f0827d9d00aba289
SHA25619255f182cbb7e9293b3a1604085085b93f3c5f56a4aeaf10dc33293d56fd62d
SHA5121a6da7113dda490d133b43de92ab44f625407ae5861417a57b8d8f88eb0c938c172f6f1bc9212925cd4e61c7e38658fa771f63ebb7be940e1c8747c42a6e51f8
-
Filesize
156B
MD5e916259125a79588ade532cfafeae13f
SHA1879b75fbc1352c1e8b69f16f3658d05c5eb667d3
SHA25679f1a5ba03fd7aaa735ea8f57c5d8386614c62ce0f32b5e6500db22bc0c41ab7
SHA512164af1c5b9cebe42943d2b53b709f62928385e26b426d15c121085012c6db2d1da36dcf4239af788af64d08280dc72fa541de278ad6082645139eecf64a1c2d9
-
Filesize
1.9MB
MD5c6057d2b61be59e1495e001637fadb3d
SHA1e35d65f9dab12340a14512a6174371a547386e41
SHA2561b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84
SHA5126d38b061600ecf9c529a816bdf00396d3d33ea670443ae956cb5b6bbe9f98efeb5f7ba1142d8b83a7e26c4454aba57e57967aa64b9d6cded381a113bddbcff43
-
Filesize
1.9MB
MD5c6057d2b61be59e1495e001637fadb3d
SHA1e35d65f9dab12340a14512a6174371a547386e41
SHA2561b48c20c649d7e5876bcbe632bc45c75718a9ca75f0161c1da4d223fe06a6b84
SHA5126d38b061600ecf9c529a816bdf00396d3d33ea670443ae956cb5b6bbe9f98efeb5f7ba1142d8b83a7e26c4454aba57e57967aa64b9d6cded381a113bddbcff43