Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
54s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 20:26
Static task
static1
General
-
Target
Acura_Beta.exe
-
Size
13.3MB
-
MD5
a389cc231fdee69ed8c2f92469ee45fb
-
SHA1
d1dd458348ec425a3342ea9017ff40132afb841b
-
SHA256
0b0f3b2cc17d98ad7b86f6b23ad42a567eda77fec27c6ce59f5c7b49870b4176
-
SHA512
10b28d1467bf09070095efd27193efee990dc4a03689f4f53a4ecd35ae960aa1a80d4494c7df70064b37bc8168d2e95009f1efc8b595591eacd577295278a74a
-
SSDEEP
393216:ZqewzZkBoJxJ64xqty07/LEwuqs16bfDalbRNmOtDDObj:ZqDUofJ64stF7/L856ylRNmOt3Q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4732 Injector-obf.exe -
Loads dropped DLL 64 IoCs
pid Process 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4532 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 4732 Injector-obf.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4732 Injector-obf.exe Token: SeDebugPrivilege 1832 taskmgr.exe Token: SeSystemProfilePrivilege 1832 taskmgr.exe Token: SeCreateGlobalPrivilege 1832 taskmgr.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe 1832 taskmgr.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2904 wrote to memory of 4732 2904 Acura_Beta.exe 86 PID 2904 wrote to memory of 4732 2904 Acura_Beta.exe 86 PID 4732 wrote to memory of 3168 4732 Injector-obf.exe 87 PID 4732 wrote to memory of 3168 4732 Injector-obf.exe 87 PID 4732 wrote to memory of 2764 4732 Injector-obf.exe 89 PID 4732 wrote to memory of 2764 4732 Injector-obf.exe 89 PID 2764 wrote to memory of 4532 2764 cmd.exe 90 PID 2764 wrote to memory of 4532 2764 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Acura_Beta.exe"C:\Users\Admin\AppData\Local\Temp\Acura_Beta.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\onefile_2904_133628704674625457\Injector-obf.exe"C:\Users\Admin\AppData\Local\Temp\Acura_Beta.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:3168
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ipconfig /all"3⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:4532
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5328e41b501a51b58644c7c6930b03234
SHA1bc09f8b62fec750a48bafd9db3494d2f30f7bd54
SHA2562782cf3c04801ede65011be282e99cd34d163b2b2b2333fd3147b33f7d5e72ab
SHA512c6e6e6bca0e9c4e84f7c07541995a7ee4960da095329f69120ba631c3c3e07c0441cf2612d9dcc3d062c779aec7d4e6a00f71f57cc32e2a980a1e3574b67d248
-
Filesize
54KB
MD5949cbd1361c585174685b7ce1390dc99
SHA1855bd73bfbf4ac5086c6529ad138787c3223816b
SHA2566b4f64d50693d573721c033b85492ad227318c5e15199988f971a9ce32b0e6d7
SHA5123bf66623b8a51ae1b62c93f85e9c0e677652eafbc105926d72ac1edf530f0209156d486f605d61789c8e93c9aa768f96ed98e32c4b2553b32f93b7881b958bed
-
Filesize
58KB
MD547be1dc9f556bf2d0fe2237e3194e4d8
SHA118642b8238d5423f9e8dd946bfcb2e990b726dd5
SHA2564a408fe2595f46409a449e17f1f8eaf1f5d0dc3978a594fb4cbf3e90532abbfc
SHA512e5ea98195bc42f2140f04dea8b59fbdff56f67162baf83f7ff9677361f85f2fd87fea81cba0255164d79777dfd6fff228cfc9418fa93cca1b954d559c6571c53
-
Filesize
513KB
MD5336153eb39fad4a319d2f1dc4a612faf
SHA11866f64f668e01f667b0cf0995f43f771717a596
SHA25620c82ac667e65745d91bb58fec99f8d6f3de57df31079f3980196114fc467d69
SHA51264025cbb60e229d714b7e56b42ef36bf66466186bf8695815d58ae352f0a4a7eee8aa8eeb55f46e5ea81ea46bbd18564db779e95930c1cc76408482b57a8c697
-
Filesize
33.1MB
MD5bd3af1326b619ce084be015c77975079
SHA1d4eb7f17fdb4880bdc60b9450a81898312c74f3e
SHA25660d6acecad71178db41efd084bd44a13fd5398daf1dfad01584160f280cad785
SHA5128954e24d40197fd664fcf986364c964ece6c1e11bcfec68b9dba51fc7456cfc9778fba0bb4c84b3fd329d063b25b5e78a4ebe2087a213d5d754f52ea091e5726
-
Filesize
95KB
MD5f34eb034aa4a9735218686590cba2e8b
SHA12bc20acdcb201676b77a66fa7ec6b53fa2644713
SHA2569d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1
SHA512d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af
-
Filesize
65KB
MD5a3f434f6cfd2f339876e7d345fe178fb
SHA1ff71d1a2edc691491394517de2c32f2134925776
SHA256102043b17c20043e4624f60e444131382363b69ff0e683c13fa17af156766483
SHA5126f2d69627a7f01f295add9f1b333bfdba34eae56b04a574227c2ece315ab803683dc3d38b70b095736d2cbc68b3463dd16e54e9c66b757ecb28ad1297e617632
-
Filesize
85KB
MD5b024a6f227eafa8d43edfc1a560fe651
SHA192451be6a2a6bfc4a8de8ad3559ba4a25d409f2e
SHA256c0dd9496b19ba9536a78a43a97704e7d4bef3c901d196ed385e771366682819d
SHA512b9edb6d0f1472dd01969e6f160b41c1e7e935d4eebcaf08554195eb85d91c19ff1bfbc150773f197462e582c6d31f12bd0304f636eb4f189ed3ed976824b283e
-
Filesize
125KB
MD5a1e9b3cc6b942251568e59fd3c342205
SHA13c5aaa6d011b04250f16986b3422f87a60326834
SHA256a8703f949c9520b76cb1875d1176a23a2b3ef1d652d6dfac6e1de46dc08b2aa3
SHA5122015b2ae1b17afc0f28c4af9cedf7d0b6219c4c257dd0c89328e5bd3eee35e2df63ef4fccb3ee38e7e65f01233d7b97fc363c0eae0cfa7754612c80564360d6f
-
Filesize
64KB
MD569dc506cf2fa3da9d0caba05fca6a35d
SHA133b24abb7b1d68d3b0315be7f8f49de50c9bdcb6
SHA256c5b8c4582e201fef2d8cb2c8672d07b86dec31afb4a17b758dbfb2cff163b12f
SHA5120009ec88134e25325a47b8b358da0fed8bb34fe80602e08a60686f6029b80f4287d33adb66ef41435d11d6edff86a88916f776eeaf2d1cb72035783f109ca1ff
-
Filesize
160KB
MD577b78b43d58fe7ce9eb2fbb1420889fa
SHA1de55ce88854e314697fa54703a2cd6cc970f3111
SHA2566e571d93ce55d09583ec91c607883a43c1da3d4d36794d68c6ecd6bea4ab466a
SHA5127b03b7d3f2fd9b51391de08e69ca9156a0232b56f210878a488b9d5a19492ab5880f45d9407331360fbe543a52c03d68f68da4387bf6a13b20ec903a7b081846
-
Filesize
46KB
MD5fa44f2ac914b98bcec6dd102ec612f87
SHA14840ce511f46ff9523fa1874f70463491282697f
SHA256ac33b6b3aacc31d2db8a502110881b4b711e2fb94983f85581e30953c9ac4721
SHA512e6d691bc8622a616c7ebe98c362b7b9257c1840bee15161941a1e43a228e48985cb81ecdf41a8d4f60b6bf11a1dec16e81c12576d0ca00e6047e621f7dda3538
-
Filesize
79KB
MD5cd56f508e7c305d4bfdeb820ecf3a323
SHA1711c499bcf780611a815afa7374358bbfd22fcc9
SHA2569e97b782b55400e5a914171817714bbbc713c0a396e30496c645fc82835e4b34
SHA512e937c322c78e40947c70413404beba52d3425945b75255590dedf84ee429f685e0e5bc86ad468044925fbc59cf7ec8698a5472dd4f05b4363da30de04f9609a5
-
Filesize
153KB
MD570014e88ecf3133b7be097536f77b459
SHA15d75675bb35ba6fae774937789491e051e62a252
SHA256d318795c98c5f3c127c8e47220a92acba0736daf31bab0dc9c7e6c3513bb2aa3
SHA512aa59b32c9164afca1b799e389c7087e95eeaa543790b6f590f9e30aa13b7fdb8cc83d0ef6351f0b578a4da636f4ca1e6dfe4558dcf3a813b744a80f7392aa462
-
Filesize
24KB
MD5d7074a9d35ed4ff90b93660ed4f1ba75
SHA1418f4e62c61b30aece854551a5b629d23eaad010
SHA256c4ce019fbd541918d3e7ddf7845bf0449068fc7eee3b57da730860fc7741d561
SHA5126cf06012683aa4fbd85341e496434add21eaa6c72b8100a4ea2539702062860f97ab8b324064ad0689faa81762f4961d956047130d8a14a543ccf0c57a05173c
-
Filesize
256KB
MD5e229b3acfea367783a493e3b9abc5f90
SHA19425a3c653d1ea5994569b2530d322bfb9176f1a
SHA256e0334c4abc181ab13d4935cba2d0a731fffda042eff9317ef0e11163ec2bb266
SHA5127614a688b66684c77d69d41eca0aadf4ddd3dd23be41b020a183f177cc6b0dfb14ea0a98dc27d369c33973ab1feb235cef4cda6e0bb5931d0d7abdf0420aebd2
-
Filesize
47KB
MD5b9367d021a51117a01d20589617230d7
SHA111d6aefba3dd6c56954de369bd37e253394a2174
SHA2566d3c35d4cf85f01d85c9a5d400174ee8863c5b5193f20307a9db7f03e5b5a497
SHA5123e4f51a7493e2e44f53cd7f2952f1f424d48b85e7013956e2b1bc27cdea7aa5ecccbd207a065197a33f11994244464bae6fc2e0998c2d6b6439dbaf3e05a47f5
-
Filesize
35KB
MD585cc9587e773b72dd53a8c4c2d83cc47
SHA10cfff13bf7e1eafb64bf10de84f7e90955aae635
SHA2563acbafdeb39e0fa243ea207f0ad9d584f877f6afed4add6d71831cb734433456
SHA512f65334560128cc0cdd31f93fb3fe5e8ad4dd9f3e49cbe8337aeb3d2f137863f1b489cdcfd5d5aff8e2d17033c17b1b48381bc57a1faa1f700ad070e88b7ece3d
-
Filesize
84KB
MD574ce6c9fa79d68f28e71542b6748d852
SHA17cde0ebacfc077381bbcc89ab7c765061dac86a0
SHA2562d9ca84489306acfb5fa47944279dbad1b1c7fea201d8dd0f2ea81381476eacb
SHA512bc4c1509ac5cbcbdae23e2f9c03ad345ef3f7e53f78698c24f6a44b618878f955b7cd03105b779270e7a8ac587c948d159671fdfbd31d85a0a505677979a2423
-
Filesize
3.3MB
MD5ab01c808bed8164133e5279595437d3d
SHA10f512756a8db22576ec2e20cf0cafec7786fb12b
SHA2569c0a0a11629cced6a064932e95a0158ee936739d75a56338702fed97cb0bad55
SHA5124043cda02f6950abdc47413cfd8a0ba5c462f16bcd4f339f9f5a690823f4d0916478cab5cae81a3d5b03a8a196e17a716b06afee3f92dec3102e3bbc674774f2
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
682KB
MD5de72697933d7673279fb85fd48d1a4dd
SHA1085fd4c6fb6d89ffcc9b2741947b74f0766fc383
SHA256ed1c8769f5096afd000fc730a37b11177fcf90890345071ab7fbceac684d571f
SHA5120fd4678c65da181d7c27b19056d5ab0e5dd0e9714e9606e524cdad9e46ec4d0b35fe22d594282309f718b30e065f6896674d3edce6b3b0c8eb637a3680715c2c
-
Filesize
46KB
MD5e6d83eb8c1c2b1a059fadc423b426f5e
SHA165756e478193b39acda38847702f05d4dbaded34
SHA256dfe88ee3498bdadec52d3502dcd073106028efee76c0ab4559269aecfcf31211
SHA512edb3191ada44f54a37a12f94558eea29d020ad09e75b038a050286d11f49a4b1fdb2f78575453c32e080f1f784709dc92dee7c544b78f9f55f67eb58bc07e029
-
Filesize
65KB
MD53cba71b6bc59c26518dc865241add80a
SHA17e9c609790b1de110328bbbcbb4cd09b7150e5bd
SHA256e10b73d6e13a5ae2624630f3d8535c5091ef403db6a00a2798f30874938ee996
SHA5123ef7e20e382d51d93c707be930e12781636433650d0a2c27e109ebebeba1f30ea3e7b09af985f87f67f6b9d2ac6a7a717435f94b9d1585a9eb093a83771b43f2
-
Filesize
59KB
MD54a776941c0aa723c50223cb1a19e6d02
SHA108e4cdf06f3b9ee5f9d5c865b49c808d20938583
SHA2565a2f39ed041d35bb48e89c72c1ad16a5a24a3674f8eb34bfbc6310fd75128f16
SHA5120319030bd2b51bf605c8ef4324eacf3a1f2e2315c92bc0cfc8e9eb7df72038f6c377b9537fec16470363499e6e0dbb7ca164169ae43601294310f84e53a06881
-
Filesize
4.3MB
MD52135da9f78a8ef80850fa582df2c7239
SHA1aac6ad3054de6566851cae75215bdeda607821c4
SHA256324963a39b8fd045ff634bb3271508dab5098b4d99e85e7648d0b47c32dc85c3
SHA512423b03990d6aa9375ce10e6b62ffdb7e1e2f20a62d248aac822eb9d973ae2bf35deddd2550a4a0e17c51ad9f1e4f86443ca8f94050e0986daa345d30181a2369
-
Filesize
131KB
MD5f20fd2e2ac9058a9fd227172f8ff2c12
SHA189eba891352be46581b94a17db7c2ede9a39ab01
SHA25620bde8e50e42f7aabf59106eea238fcc0dece0c6e362c0a7feeb004ab981db8a
SHA51242a86fa192aea7adb4283dc48a323a4f687dad40060ea3ffddcd8fd7670bb535d31a7764706e5c5473da28399fec048ae714a111ee238bb25e1aad03e12078d4
-
Filesize
29KB
MD535bb285678b249770dda3f8a15724593
SHA1a91031d56097a4cbf800a6960e229e689ba63099
SHA25671ed480da28968a7fd07934e222ae87d943677468936fd419803280d0cad07f3
SHA512956759742b4b47609a57273b1ea7489ce39e29ebced702245a9665bb0479ba7d42c053e40c6dc446d5b0f95f8cc3f2267af56ccaaaf06e6875c94d4e3f3b6094
-
Filesize
1.1MB
MD53ba2a20dda6d1b4670767455bbe32870
SHA17c98221bc6ed763030087b1f33fb83eac2823ea4
SHA2563a0987025f1cf2111dc6e4f59402073ba123d7436d809ee4198b4e7bfb8cb868
SHA5120688f8af3359a8571bef2a89efabc2dbf26f3f5c6220932a4e7df2e33fac95cafee8b80796346ba698e6bf43630b8069f56538b95a8ff62ec21d629787ca5cd1
-
Filesize
36KB
MD5135359d350f72ad4bf716b764d39e749
SHA12e59d9bbcce356f0fece56c9c4917a5cacec63d7
SHA25634048abaa070ecc13b318cea31425f4ca3edd133d350318ac65259e6058c8b32
SHA512cf23513d63ab2192c78cae98bd3fea67d933212b630be111fa7e03be3e92af38e247eb2d3804437fd0fda70fdc87916cd24cf1d3911e9f3bfb2cc4ab72b459ba
-
Filesize
212KB
MD554ef413eb71819191995af2f6343d5dd
SHA1991819d574752465b5463600d30f0014ca9fe0ba
SHA2568fe4d4e5b7ecdc791f54f009e17c516d43bc6abd4cd3a3108a6a1f29768ac8fa
SHA51249a534df98c7c9abb7c04bc1df900fe3f11602c069cc01bb051aae59847005ec79609c44eb5cb1715dd02f7c1b7f3cb2effe3afad41ad0b83c1499c73ad66c62
-
Filesize
94KB
MD5d9271cb2648677d0972b555db8293adb
SHA1a794bb805baed0a98fa466f2531921c57cb28eba
SHA256fac45025a426c238cb38bf8d2b0eed90308df09d83020eeef0b82d72ba7cc48b
SHA512a9422851b0171501acbae97923dac85b47ee6455e85905d836543a1dbd68bf36bcbf388dd28bbc34712f9b09ba03fcf71f20805e37a5aef54611ea87657a642d