Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/02/2025, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
WinWord.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
WinWord.exe
Resource
win10v2004-20250217-en
General
-
Target
WinWord.exe
-
Size
6.9MB
-
MD5
389390bf696737deedaaf10a90d407d1
-
SHA1
87758da2fe832f302032e904eb13994c70023825
-
SHA256
d3f31c512033046c4209c5af1352f3ce36d1af39f84946c22ca3e25da6539734
-
SHA512
4b1ff3b939a22250222afc6ded49e636b76cc602ea67a587a70dac2deafabf5446f1eb27feb688b3d7759b9b4bcd46f016c8f98b42cba29920045031da6551b0
-
SSDEEP
196608:I/9sLB5t3JJQGR2nroh1L9cDIw4v6N+ED6JwtPnoDAMzvaqx/D:u6tdJ2rIcIw4vjbJCfoF+KD
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1038709348303650857/DLQdA51dlH2mWOgr-jjNC0jvu25-oWapgKwxpsqsFwOSYLm4gQOEdFE6XXg7_sReK0AB
Signatures
-
DarkTrack payload 11 IoCs
resource yara_rule behavioral1/memory/1056-74-0x0000000000090000-0x0000000000138000-memory.dmp family_darktrack behavioral1/memory/1056-79-0x0000000000090000-0x0000000000138000-memory.dmp family_darktrack behavioral1/memory/1056-102-0x0000000000090000-0x0000000000138000-memory.dmp family_darktrack behavioral1/memory/1056-82-0x0000000000090000-0x0000000000138000-memory.dmp family_darktrack behavioral1/memory/1056-69-0x0000000000090000-0x0000000000138000-memory.dmp family_darktrack behavioral1/memory/1056-65-0x0000000000090000-0x0000000000138000-memory.dmp family_darktrack behavioral1/memory/1056-63-0x0000000000090000-0x0000000000138000-memory.dmp family_darktrack behavioral1/memory/1056-61-0x0000000000090000-0x0000000000138000-memory.dmp family_darktrack behavioral1/memory/1056-59-0x0000000000090000-0x0000000000138000-memory.dmp family_darktrack behavioral1/memory/1056-57-0x0000000000090000-0x0000000000138000-memory.dmp family_darktrack behavioral1/memory/1056-55-0x0000000000090000-0x0000000000138000-memory.dmp family_darktrack -
Darktrack family
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WinWord.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Hgmuvfd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Lmfekeldirxz.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Hgmuvfd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Lmfekeldirxz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Lmfekeldirxz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WinWord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WinWord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Hgmuvfd.exe -
Executes dropped EXE 8 IoCs
pid Process 2848 Hgmuvfd.exe 2980 Djejga.exe 2748 Kgnzgrpvr.exe 2640 Lmfekeldirxz.exe 1056 Hgmuvfd.exe 1368 Djejga.exe 1780 ctfmon.exe 2880 ctfmon.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine WinWord.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine Hgmuvfd.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine Lmfekeldirxz.exe -
Loads dropped DLL 8 IoCs
pid Process 2376 WinWord.exe 2376 WinWord.exe 2376 WinWord.exe 2376 WinWord.exe 2980 Djejga.exe 2848 Hgmuvfd.exe 1368 Djejga.exe 1780 ctfmon.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 2096 icacls.exe 1980 icacls.exe 2956 icacls.exe -
Checks whether UAC is enabled 1 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WinWord.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Hgmuvfd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Lmfekeldirxz.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 discord.com 7 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 WinWord.exe File opened for modification \??\PhysicalDrive0 Hgmuvfd.exe File opened for modification \??\PhysicalDrive0 Lmfekeldirxz.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2748-46-0x0000000000400000-0x0000000000541000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2376 WinWord.exe 2848 Hgmuvfd.exe 2640 Lmfekeldirxz.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2848 set thread context of 1056 2848 Hgmuvfd.exe 41 PID 2980 set thread context of 1368 2980 Djejga.exe 40 PID 1780 set thread context of 2880 1780 ctfmon.exe 51 -
resource yara_rule behavioral1/files/0x0008000000015f96-24.dat upx behavioral1/memory/2748-29-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2748-46-0x0000000000400000-0x0000000000541000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmfekeldirxz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgnzgrpvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hgmuvfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djejga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinWord.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djejga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hgmuvfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1488 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 1484 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2376 WinWord.exe 2848 Hgmuvfd.exe 2640 Lmfekeldirxz.exe 2640 Lmfekeldirxz.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2980 Djejga.exe Token: SeDebugPrivilege 2640 Lmfekeldirxz.exe Token: SeDebugPrivilege 1484 taskkill.exe Token: SeDebugPrivilege 1368 Djejga.exe Token: SeDebugPrivilege 1780 ctfmon.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2848 2376 WinWord.exe 31 PID 2376 wrote to memory of 2848 2376 WinWord.exe 31 PID 2376 wrote to memory of 2848 2376 WinWord.exe 31 PID 2376 wrote to memory of 2848 2376 WinWord.exe 31 PID 2376 wrote to memory of 2848 2376 WinWord.exe 31 PID 2376 wrote to memory of 2848 2376 WinWord.exe 31 PID 2376 wrote to memory of 2848 2376 WinWord.exe 31 PID 2376 wrote to memory of 2980 2376 WinWord.exe 32 PID 2376 wrote to memory of 2980 2376 WinWord.exe 32 PID 2376 wrote to memory of 2980 2376 WinWord.exe 32 PID 2376 wrote to memory of 2980 2376 WinWord.exe 32 PID 2376 wrote to memory of 2980 2376 WinWord.exe 32 PID 2376 wrote to memory of 2980 2376 WinWord.exe 32 PID 2376 wrote to memory of 2980 2376 WinWord.exe 32 PID 2376 wrote to memory of 2748 2376 WinWord.exe 33 PID 2376 wrote to memory of 2748 2376 WinWord.exe 33 PID 2376 wrote to memory of 2748 2376 WinWord.exe 33 PID 2376 wrote to memory of 2748 2376 WinWord.exe 33 PID 2376 wrote to memory of 2748 2376 WinWord.exe 33 PID 2376 wrote to memory of 2748 2376 WinWord.exe 33 PID 2376 wrote to memory of 2748 2376 WinWord.exe 33 PID 2376 wrote to memory of 2640 2376 WinWord.exe 34 PID 2376 wrote to memory of 2640 2376 WinWord.exe 34 PID 2376 wrote to memory of 2640 2376 WinWord.exe 34 PID 2376 wrote to memory of 2640 2376 WinWord.exe 34 PID 2376 wrote to memory of 2640 2376 WinWord.exe 34 PID 2376 wrote to memory of 2640 2376 WinWord.exe 34 PID 2376 wrote to memory of 2640 2376 WinWord.exe 34 PID 2748 wrote to memory of 2572 2748 Kgnzgrpvr.exe 35 PID 2748 wrote to memory of 2572 2748 Kgnzgrpvr.exe 35 PID 2748 wrote to memory of 2572 2748 Kgnzgrpvr.exe 35 PID 2748 wrote to memory of 2572 2748 Kgnzgrpvr.exe 35 PID 2572 wrote to memory of 2096 2572 cmd.exe 37 PID 2572 wrote to memory of 2096 2572 cmd.exe 37 PID 2572 wrote to memory of 2096 2572 cmd.exe 37 PID 2572 wrote to memory of 2096 2572 cmd.exe 37 PID 2572 wrote to memory of 1980 2572 cmd.exe 39 PID 2572 wrote to memory of 1980 2572 cmd.exe 39 PID 2572 wrote to memory of 1980 2572 cmd.exe 39 PID 2572 wrote to memory of 1980 2572 cmd.exe 39 PID 2848 wrote to memory of 1056 2848 Hgmuvfd.exe 41 PID 2848 wrote to memory of 1056 2848 Hgmuvfd.exe 41 PID 2848 wrote to memory of 1056 2848 Hgmuvfd.exe 41 PID 2848 wrote to memory of 1056 2848 Hgmuvfd.exe 41 PID 2848 wrote to memory of 1056 2848 Hgmuvfd.exe 41 PID 2848 wrote to memory of 1056 2848 Hgmuvfd.exe 41 PID 2848 wrote to memory of 1056 2848 Hgmuvfd.exe 41 PID 2848 wrote to memory of 1056 2848 Hgmuvfd.exe 41 PID 2848 wrote to memory of 1056 2848 Hgmuvfd.exe 41 PID 2848 wrote to memory of 1056 2848 Hgmuvfd.exe 41 PID 2848 wrote to memory of 1056 2848 Hgmuvfd.exe 41 PID 2848 wrote to memory of 1056 2848 Hgmuvfd.exe 41 PID 2848 wrote to memory of 1056 2848 Hgmuvfd.exe 41 PID 2848 wrote to memory of 1056 2848 Hgmuvfd.exe 41 PID 2848 wrote to memory of 1056 2848 Hgmuvfd.exe 41 PID 2848 wrote to memory of 1056 2848 Hgmuvfd.exe 41 PID 2980 wrote to memory of 1368 2980 Djejga.exe 40 PID 2980 wrote to memory of 1368 2980 Djejga.exe 40 PID 2980 wrote to memory of 1368 2980 Djejga.exe 40 PID 2980 wrote to memory of 1368 2980 Djejga.exe 40 PID 2980 wrote to memory of 1368 2980 Djejga.exe 40 PID 2980 wrote to memory of 1368 2980 Djejga.exe 40 PID 2980 wrote to memory of 1368 2980 Djejga.exe 40 PID 2980 wrote to memory of 1368 2980 Djejga.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinWord.exe"C:\Users\Admin\AppData\Local\Temp\WinWord.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Hgmuvfd.exe"C:\Users\Admin\AppData\Local\Temp\Hgmuvfd.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Hgmuvfd.exe"C:\Users\Admin\AppData\Local\Temp\Hgmuvfd.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1056
-
-
-
C:\Users\Admin\AppData\Local\Temp\Djejga.exe"C:\Users\Admin\AppData\Local\Temp\Djejga.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Djejga.exe"C:\Users\Admin\AppData\Local\Temp\Djejga.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1368 -
C:\Users\Admin\AppData\Roaming\ctfmon.exe"C:\Users\Admin\AppData\Roaming\ctfmon.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1780 -
C:\Users\Admin\AppData\Roaming\ctfmon.exe"C:\Users\Admin\AppData\Roaming\ctfmon.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Kgnzgrpvr.exe"C:\Users\Admin\AppData\Local\Temp\Kgnzgrpvr.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\AppData\Roaming\Certificates" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" & icacls "C:\Users\Admin\AppData\Roaming\Certificates" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)" & icacls "C:\Users\Admin\AppData\Roaming\Certificates" /inheritance:e /deny "Admin:(R,REA,RA,RD)"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\Certificates" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2096
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\Certificates" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1980
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\Certificates" /inheritance:e /deny "Admin:(R,REA,RA,RD)"4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2956
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Lmfekeldirxz.exe"C:\Users\Admin\AppData\Local\Temp\Lmfekeldirxz.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp201E.tmp.bat3⤵
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2496
-
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 26404⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak4⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1488
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C712F4C5-74E5-4C9F-B537-D35D9CE5506F} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵PID:2472
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5636613c40c1b5affc836b6d8608c78f4
SHA193b49a30a30fe5d44bc2682fa1cd611459fd99db
SHA256d00a935f81c1a3ff358c7cef5783bbbe380287b5ed8a7e87097418bf48eb3be2
SHA5121705d9d593e4c6f173a5f617246fe94bbf44de02e6a940492b60adbb7abec1c32086744440827d6a508bd7baec87f653d59561b4d79a22c1554e686302ba7c68
-
Filesize
224KB
MD514bc123a8209f7c21aacea4cd179fbec
SHA1e602df06e8f03dfa99d5234544e93c63f45ab97b
SHA256eeb5a75e3231ee95a2340be3767ca41c3aec92c2d46b90f1d67fdfec0d254f7e
SHA51263b71f24b5876432d80de7eff3a78d40d308baf208566945f6a331f4254aff886a18763d6becc503dda02bfd251588221c9a10a59fd96d495ed4e205d06ad6dd
-
Filesize
3.0MB
MD50372cb4f806947727400d1937f3e8063
SHA189aee134a5226e103f702f434a059c601eebf336
SHA2565f2b46e3cfb853b3be645309ea8378f6535bf7128e0794ff9ab2ef0972554e8a
SHA512b92f743d4fd4101bee6e6a8becba6be698f36ac83a18b0913bf0bc22d8a0ca57ea1bf659936a9398f729ed6b0f323bb437e6a67b4e0d5a79efba0baadf093fe1
-
Filesize
57B
MD536410191e1fd20449b6337114986e329
SHA1ca631ba3ff0121ca0b7ef2f40ad1d5199d36227f
SHA256a7ac3a27fbfdc9c3fea80c72431fff73e7ce3c7e95645d114e379bde144c28df
SHA5126a93cd85d4e6d9b45c9fddfe29c0cb723f0b0ab9cbe648012f90a5659c45faf752670a12c241fb53d4ad1d873ecc6bbf618d36eac0695b8fa528a4f5bf5ad44c
-
Filesize
2.1MB
MD578d3152616dedb9801ce61015324ae8a
SHA1e8a31f392db771e8ca7759c11de53519a48e0fc0
SHA25698d8fec346fc1865dc8b620f74826f484fe9c0c705dc9d58c5f44df934a01208
SHA51220ab9c27d1b1774859adf5304f10118e63c43db978d6d884aa1deb5c53b1884d5529350a3f0d8fd66b0d99dc19653c431d5f508b0ebc718783bd16083f52daf3
-
Filesize
652KB
MD5f9a67d8b903d4c3b27b55d1bfdd5c70c
SHA1d78b8da5b3ffdd55bd30912a36c69d5a5752fa95
SHA256e8b943f45cc37ddc9e594eb3ccc7057820f54939bd9b38b1b3703a14da52e01f
SHA51263d762e4f0fb7302c1731e8e907f2efb207be5ea7f57aa29aad2a34e7c09d0d1976ef429e1668bd0869d2f9c341ac5c1da953725c3cd83cf655875a8cdab90e3