Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/02/2025, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
WinWord.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
WinWord.exe
Resource
win10v2004-20250217-en
General
-
Target
WinWord.exe
-
Size
6.9MB
-
MD5
389390bf696737deedaaf10a90d407d1
-
SHA1
87758da2fe832f302032e904eb13994c70023825
-
SHA256
d3f31c512033046c4209c5af1352f3ce36d1af39f84946c22ca3e25da6539734
-
SHA512
4b1ff3b939a22250222afc6ded49e636b76cc602ea67a587a70dac2deafabf5446f1eb27feb688b3d7759b9b4bcd46f016c8f98b42cba29920045031da6551b0
-
SSDEEP
196608:I/9sLB5t3JJQGR2nroh1L9cDIw4v6N+ED6JwtPnoDAMzvaqx/D:u6tdJ2rIcIw4vjbJCfoF+KD
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1038709348303650857/DLQdA51dlH2mWOgr-jjNC0jvu25-oWapgKwxpsqsFwOSYLm4gQOEdFE6XXg7_sReK0AB
Signatures
-
DarkTrack payload 10 IoCs
resource yara_rule behavioral1/memory/2880-81-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral1/memory/2880-83-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral1/memory/2880-65-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral1/memory/2880-90-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral1/memory/2880-62-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral1/memory/2880-60-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral1/memory/2880-58-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral1/memory/2880-56-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral1/memory/2880-54-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral1/memory/2880-52-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack -
Darktrack family
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Stealerium family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WinWord.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Hgmuvfd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Lmfekeldirxz.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Lmfekeldirxz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Lmfekeldirxz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WinWord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WinWord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Hgmuvfd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Hgmuvfd.exe -
Executes dropped EXE 8 IoCs
pid Process 2652 Hgmuvfd.exe 2628 Djejga.exe 2180 Kgnzgrpvr.exe 536 Lmfekeldirxz.exe 2880 Hgmuvfd.exe 2856 Djejga.exe 2828 ctfmon.exe 2740 ctfmon.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine WinWord.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Hgmuvfd.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Lmfekeldirxz.exe -
Loads dropped DLL 8 IoCs
pid Process 2756 WinWord.exe 2756 WinWord.exe 2756 WinWord.exe 2756 WinWord.exe 2652 Hgmuvfd.exe 2628 Djejga.exe 2856 Djejga.exe 2828 ctfmon.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 1176 icacls.exe 2268 icacls.exe 1092 icacls.exe -
Checks whether UAC is enabled 1 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WinWord.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Hgmuvfd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Lmfekeldirxz.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 discord.com 7 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 WinWord.exe File opened for modification \??\PhysicalDrive0 Hgmuvfd.exe File opened for modification \??\PhysicalDrive0 Lmfekeldirxz.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2180-89-0x0000000000400000-0x0000000000541000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2756 WinWord.exe 2652 Hgmuvfd.exe 536 Lmfekeldirxz.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2652 set thread context of 2880 2652 Hgmuvfd.exe 35 PID 2628 set thread context of 2856 2628 Djejga.exe 34 PID 2828 set thread context of 2740 2828 ctfmon.exe 50 -
resource yara_rule behavioral1/files/0x0008000000016d1f-24.dat upx behavioral1/memory/2180-29-0x0000000000400000-0x0000000000541000-memory.dmp upx behavioral1/memory/2180-89-0x0000000000400000-0x0000000000541000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djejga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgnzgrpvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hgmuvfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Djejga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinWord.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hgmuvfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lmfekeldirxz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com -
Delays execution with timeout.exe 1 IoCs
pid Process 1588 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 876 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2756 WinWord.exe 2652 Hgmuvfd.exe 536 Lmfekeldirxz.exe 536 Lmfekeldirxz.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2628 Djejga.exe Token: SeDebugPrivilege 536 Lmfekeldirxz.exe Token: SeDebugPrivilege 876 taskkill.exe Token: SeDebugPrivilege 2856 Djejga.exe Token: SeDebugPrivilege 2828 ctfmon.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2652 2756 WinWord.exe 30 PID 2756 wrote to memory of 2652 2756 WinWord.exe 30 PID 2756 wrote to memory of 2652 2756 WinWord.exe 30 PID 2756 wrote to memory of 2652 2756 WinWord.exe 30 PID 2756 wrote to memory of 2652 2756 WinWord.exe 30 PID 2756 wrote to memory of 2652 2756 WinWord.exe 30 PID 2756 wrote to memory of 2652 2756 WinWord.exe 30 PID 2756 wrote to memory of 2628 2756 WinWord.exe 31 PID 2756 wrote to memory of 2628 2756 WinWord.exe 31 PID 2756 wrote to memory of 2628 2756 WinWord.exe 31 PID 2756 wrote to memory of 2628 2756 WinWord.exe 31 PID 2756 wrote to memory of 2628 2756 WinWord.exe 31 PID 2756 wrote to memory of 2628 2756 WinWord.exe 31 PID 2756 wrote to memory of 2628 2756 WinWord.exe 31 PID 2756 wrote to memory of 2180 2756 WinWord.exe 32 PID 2756 wrote to memory of 2180 2756 WinWord.exe 32 PID 2756 wrote to memory of 2180 2756 WinWord.exe 32 PID 2756 wrote to memory of 2180 2756 WinWord.exe 32 PID 2756 wrote to memory of 2180 2756 WinWord.exe 32 PID 2756 wrote to memory of 2180 2756 WinWord.exe 32 PID 2756 wrote to memory of 2180 2756 WinWord.exe 32 PID 2756 wrote to memory of 536 2756 WinWord.exe 33 PID 2756 wrote to memory of 536 2756 WinWord.exe 33 PID 2756 wrote to memory of 536 2756 WinWord.exe 33 PID 2756 wrote to memory of 536 2756 WinWord.exe 33 PID 2756 wrote to memory of 536 2756 WinWord.exe 33 PID 2756 wrote to memory of 536 2756 WinWord.exe 33 PID 2756 wrote to memory of 536 2756 WinWord.exe 33 PID 2652 wrote to memory of 2880 2652 Hgmuvfd.exe 35 PID 2652 wrote to memory of 2880 2652 Hgmuvfd.exe 35 PID 2652 wrote to memory of 2880 2652 Hgmuvfd.exe 35 PID 2652 wrote to memory of 2880 2652 Hgmuvfd.exe 35 PID 2652 wrote to memory of 2880 2652 Hgmuvfd.exe 35 PID 2652 wrote to memory of 2880 2652 Hgmuvfd.exe 35 PID 2652 wrote to memory of 2880 2652 Hgmuvfd.exe 35 PID 2652 wrote to memory of 2880 2652 Hgmuvfd.exe 35 PID 2652 wrote to memory of 2880 2652 Hgmuvfd.exe 35 PID 2652 wrote to memory of 2880 2652 Hgmuvfd.exe 35 PID 2652 wrote to memory of 2880 2652 Hgmuvfd.exe 35 PID 2652 wrote to memory of 2880 2652 Hgmuvfd.exe 35 PID 2652 wrote to memory of 2880 2652 Hgmuvfd.exe 35 PID 2652 wrote to memory of 2880 2652 Hgmuvfd.exe 35 PID 2652 wrote to memory of 2880 2652 Hgmuvfd.exe 35 PID 2652 wrote to memory of 2880 2652 Hgmuvfd.exe 35 PID 2628 wrote to memory of 2856 2628 Djejga.exe 34 PID 2628 wrote to memory of 2856 2628 Djejga.exe 34 PID 2628 wrote to memory of 2856 2628 Djejga.exe 34 PID 2628 wrote to memory of 2856 2628 Djejga.exe 34 PID 2628 wrote to memory of 2856 2628 Djejga.exe 34 PID 2628 wrote to memory of 2856 2628 Djejga.exe 34 PID 2628 wrote to memory of 2856 2628 Djejga.exe 34 PID 2628 wrote to memory of 2856 2628 Djejga.exe 34 PID 2628 wrote to memory of 2856 2628 Djejga.exe 34 PID 2628 wrote to memory of 2856 2628 Djejga.exe 34 PID 2628 wrote to memory of 2856 2628 Djejga.exe 34 PID 2628 wrote to memory of 2856 2628 Djejga.exe 34 PID 2628 wrote to memory of 2856 2628 Djejga.exe 34 PID 2180 wrote to memory of 2444 2180 Kgnzgrpvr.exe 36 PID 2180 wrote to memory of 2444 2180 Kgnzgrpvr.exe 36 PID 2180 wrote to memory of 2444 2180 Kgnzgrpvr.exe 36 PID 2180 wrote to memory of 2444 2180 Kgnzgrpvr.exe 36 PID 2444 wrote to memory of 2268 2444 cmd.exe 39 PID 2444 wrote to memory of 2268 2444 cmd.exe 39 PID 2444 wrote to memory of 2268 2444 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinWord.exe"C:\Users\Admin\AppData\Local\Temp\WinWord.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Hgmuvfd.exe"C:\Users\Admin\AppData\Local\Temp\Hgmuvfd.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Hgmuvfd.exe"C:\Users\Admin\AppData\Local\Temp\Hgmuvfd.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Djejga.exe"C:\Users\Admin\AppData\Local\Temp\Djejga.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Djejga.exe"C:\Users\Admin\AppData\Local\Temp\Djejga.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2856 -
C:\Users\Admin\AppData\Roaming\ctfmon.exe"C:\Users\Admin\AppData\Roaming\ctfmon.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2828 -
C:\Users\Admin\AppData\Roaming\ctfmon.exe"C:\Users\Admin\AppData\Roaming\ctfmon.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Kgnzgrpvr.exe"C:\Users\Admin\AppData\Local\Temp\Kgnzgrpvr.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c icacls "C:\Users\Admin\AppData\Roaming\Certificates" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)" & icacls "C:\Users\Admin\AppData\Roaming\Certificates" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)" & icacls "C:\Users\Admin\AppData\Roaming\Certificates" /inheritance:e /deny "Admin:(R,REA,RA,RD)"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\Certificates" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2268
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\Certificates" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1092
-
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Roaming\Certificates" /inheritance:e /deny "Admin:(R,REA,RA,RD)"4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1176
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Lmfekeldirxz.exe"C:\Users\Admin\AppData\Local\Temp\Lmfekeldirxz.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpBAE6.tmp.bat3⤵
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:892
-
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 5364⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak4⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1588
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5A8D14C0-6CE5-4E6B-BEC4-A62F93D9085C} S-1-5-21-312935884-697965778-3955649944-1000:MXQFNXLT\Admin:Interactive:[1]1⤵PID:2472
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5636613c40c1b5affc836b6d8608c78f4
SHA193b49a30a30fe5d44bc2682fa1cd611459fd99db
SHA256d00a935f81c1a3ff358c7cef5783bbbe380287b5ed8a7e87097418bf48eb3be2
SHA5121705d9d593e4c6f173a5f617246fe94bbf44de02e6a940492b60adbb7abec1c32086744440827d6a508bd7baec87f653d59561b4d79a22c1554e686302ba7c68
-
Filesize
224KB
MD514bc123a8209f7c21aacea4cd179fbec
SHA1e602df06e8f03dfa99d5234544e93c63f45ab97b
SHA256eeb5a75e3231ee95a2340be3767ca41c3aec92c2d46b90f1d67fdfec0d254f7e
SHA51263b71f24b5876432d80de7eff3a78d40d308baf208566945f6a331f4254aff886a18763d6becc503dda02bfd251588221c9a10a59fd96d495ed4e205d06ad6dd
-
Filesize
56B
MD5b57d7c9cc4f2add16780a8503ef17d13
SHA15b5b436b17e50f485b29d73538637a918625b557
SHA256b5c48fe1a2566eedc56d691330702a338ece96a43a996c3fc566924ab10856aa
SHA512088de4cacba806e00d875c914a652cdd164f8c9a62525a9eab1a374f57aefc599ee841164e1380000971ed5745c14608ad2470868ba491039b7dca04b0df7617
-
Filesize
2.1MB
MD578d3152616dedb9801ce61015324ae8a
SHA1e8a31f392db771e8ca7759c11de53519a48e0fc0
SHA25698d8fec346fc1865dc8b620f74826f484fe9c0c705dc9d58c5f44df934a01208
SHA51220ab9c27d1b1774859adf5304f10118e63c43db978d6d884aa1deb5c53b1884d5529350a3f0d8fd66b0d99dc19653c431d5f508b0ebc718783bd16083f52daf3
-
Filesize
652KB
MD5f9a67d8b903d4c3b27b55d1bfdd5c70c
SHA1d78b8da5b3ffdd55bd30912a36c69d5a5752fa95
SHA256e8b943f45cc37ddc9e594eb3ccc7057820f54939bd9b38b1b3703a14da52e01f
SHA51263d762e4f0fb7302c1731e8e907f2efb207be5ea7f57aa29aad2a34e7c09d0d1976ef429e1668bd0869d2f9c341ac5c1da953725c3cd83cf655875a8cdab90e3
-
Filesize
3.0MB
MD50372cb4f806947727400d1937f3e8063
SHA189aee134a5226e103f702f434a059c601eebf336
SHA2565f2b46e3cfb853b3be645309ea8378f6535bf7128e0794ff9ab2ef0972554e8a
SHA512b92f743d4fd4101bee6e6a8becba6be698f36ac83a18b0913bf0bc22d8a0ca57ea1bf659936a9398f729ed6b0f323bb437e6a67b4e0d5a79efba0baadf093fe1