Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 12:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1195298016588996621/1195298089410506833/Factura-PDF.GZ?ex=65b37b18&is=65a10618&hm=17a4293eb33fe94c52b5138d86634e07139f0062b5667b82714df3d7e0ee4a3e&
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://cdn.discordapp.com/attachments/1195298016588996621/1195298089410506833/Factura-PDF.GZ?ex=65b37b18&is=65a10618&hm=17a4293eb33fe94c52b5138d86634e07139f0062b5667b82714df3d7e0ee4a3e&
Resource
win10v2004-20231215-en
General
-
Target
https://cdn.discordapp.com/attachments/1195298016588996621/1195298089410506833/Factura-PDF.GZ?ex=65b37b18&is=65a10618&hm=17a4293eb33fe94c52b5138d86634e07139f0062b5667b82714df3d7e0ee4a3e&
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4852 Factura-PDF.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000600000001e7dd-271.dat autoit_exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1848 4852 WerFault.exe 128 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 2668 msedge.exe 2668 msedge.exe 2672 identity_helper.exe 2672 identity_helper.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5808 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 5808 7zFM.exe Token: 35 5808 7zFM.exe Token: SeSecurityPrivilege 5808 7zFM.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 5808 7zFM.exe 5808 7zFM.exe 2668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe 2668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2124 2668 msedge.exe 91 PID 2668 wrote to memory of 2124 2668 msedge.exe 91 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 4080 2668 msedge.exe 93 PID 2668 wrote to memory of 3912 2668 msedge.exe 94 PID 2668 wrote to memory of 3912 2668 msedge.exe 94 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95 PID 2668 wrote to memory of 3028 2668 msedge.exe 95
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1195298016588996621/1195298089410506833/Factura-PDF.GZ?ex=65b37b18&is=65a10618&hm=17a4293eb33fe94c52b5138d86634e07139f0062b5667b82714df3d7e0ee4a3e&1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa329446f8,0x7ffa32944708,0x7ffa329447182⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10108224374521101728,17175204139001489483,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,10108224374521101728,17175204139001489483,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,10108224374521101728,17175204139001489483,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10108224374521101728,17175204139001489483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10108224374521101728,17175204139001489483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10108224374521101728,17175204139001489483,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10108224374521101728,17175204139001489483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,10108224374521101728,17175204139001489483,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3480 /prefetch:82⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,10108224374521101728,17175204139001489483,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10108224374521101728,17175204139001489483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,10108224374521101728,17175204139001489483,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3484 /prefetch:82⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2112,10108224374521101728,17175204139001489483,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10108224374521101728,17175204139001489483,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10108224374521101728,17175204139001489483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10108224374521101728,17175204139001489483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3668 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2112,10108224374521101728,17175204139001489483,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:1656
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Factura-PDF (1).GZ"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5808
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3416
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4032
-
C:\Users\Admin\Downloads\Factura-PDF.exe"C:\Users\Admin\Downloads\Factura-PDF.exe"1⤵
- Executes dropped EXE
PID:4852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 6322⤵
- Program crash
PID:1848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4852 -ip 48521⤵PID:100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5b225c6a12d23d6295f4515f3bc34a9b4
SHA14ccd93fc8dac6edfb8655e1d89391784fc7f7fb3
SHA256303ac676da04f33d6329fec2ecb4e6265f6d07554a4699b325f180e546b79492
SHA5125789e6438970310b0bbc1421818885133491211edd72b013f57d4a35ccd13b36211549a6df675eded1d32e7fbfb2d9362a6d77737276e9497157e8402e4f848f
-
Filesize
152B
MD5efc9c7501d0a6db520763baad1e05ce8
SHA160b5e190124b54ff7234bb2e36071d9c8db8545f
SHA2567af7b56e2f0a84ae008785726f3404eb9001baa4b5531d0d618c6bdcb05a3a7a
SHA512bda611ddba56513a30295ea5ca8bc59e552154f860d13fed97201cdb81814dd6d1bca7deca6f8f58c9ae585d91e450f4383a365f80560f4b8e59a4c8b53c327d
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD57731be1d11a21ffbec09df1c8d4f19cf
SHA18d4e68f579a751c4ea7c990c78985922e10261ea
SHA25653edfcd9a917eee859cc8cddec251cb75ae34efd99f854bff085ed361ca62d6c
SHA512f58b74ff9c276090f01bba9a68d26b394dadea752156facc079981b34550f5b7cc06916ae00eb05c23f222a0088bb4e78fa3de29471dbfeea0789942398a9a28
-
Filesize
5KB
MD55d48cad6c71c5fbf999919eefff0c135
SHA1b14a52730d9984d12550ca225e06410641543c51
SHA2561b4bb79c3d157e653c53f095a67fa3a0e3661d847061b1dbe96fc30fb4edfdb3
SHA512279bd8296f64681ee0d8fdd2b5ba006b6b2f284993bf16c90c7f56da2c3ebc6a77d0bc1354b73431dc274209ae5f83f3125c4dc919e4ce893a05f7fa237b6cba
-
Filesize
5KB
MD58c983a9c350c57b8a5a045c71cad0a9f
SHA1a60d7d4e3c4dade124a4b924d6a519346b6d9131
SHA2560f17818da257be7cdac24f5aff2c96a39be4988d59f6601fc2b123e03d0b0a46
SHA512429bfad7ae94b7ca80caf682764d80b449e1c69d0b3aa0e4c997abbef762d6445080e73eadd2e254355543842b4eaeaa539bc928c64ee6eb39232cbb40d8e529
-
Filesize
6KB
MD5205737ecc175fd73918b3c4c8ce39e43
SHA192dccbf37a204db275a566d0909fb4f1ae3bd0c3
SHA256536d24b81a864b72a6e49194d547763e86fc8c5200a39412d0c4cb838f0d2eb2
SHA512cf7b98e9944b64684850b032a845808b6f8c062362a3e7380944dde57c3b09abfba9b73affabb5c4926b3a7b72cdef4b996be3091ae4cb9aa212763537979bda
-
Filesize
24KB
MD5121510c1483c9de9fdb590c20526ec0a
SHA196443a812fe4d3c522cfdbc9c95155e11939f4e2
SHA256cf5d26bc399d0200a32080741e12f77d784a3117e6d58e07106e913f257aa46c
SHA512b367741da9ab4e9a621ad663762bd9c459676e0fb1412e60f7068834cbd5c83b050608e33d5320e1b191be1d809fef48831e0f42b3ecabd38b24ec222576fa81
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c814adda5c51d78d5c986218d752ec03
SHA1912679bf6a918d02cd0d15bebf16b22cb310b082
SHA2563f981f5793aff65f2d1975c69d635b898cbec31ff5b35973a4687ca95263ffe7
SHA5124e729f597fe3cd7678cd6de3975eaad662cbda1a79b04ded430f17e5e9d6a08f0f4c70baf4fd72a9480036d447021047a80e20dab7f4c9d74a2141242bbc1857
-
Filesize
12KB
MD5824f15ef8bb40ba8d0cc3524ada25e01
SHA1b36b14b6accccf52d4a909125cc721c0ca90bc64
SHA256cc07c2997ad8a59fbc0445e398c88920f940c1589ba4802f0afb42f419c44392
SHA512536b958c12a6a64f9843fcebfb3af438a0c707a1dcb8529be3d8fb8aa997bb2848976afbbd7c42a4a4c22ae2b00f5261d63f0fb260533b08ceb3eecb40ef5be7
-
Filesize
12KB
MD58c74531ce0c1d6fe607c99ae99152027
SHA1556585ff121bb43c94dc670773da6aae19a5bd12
SHA256b6414922e2d35938e2615d829492e8dd4bb22e6532fbf39914efe2059ff2b4f1
SHA512750031617c95577cf499b3544a6fc8ed4ffe43403ba742bb532b82611e7d3a190a6cae3db658c90e6ed0a17fcf458f82923a8e6d3509fcdbb537161efd07f8bf
-
Filesize
680KB
MD53c1ddbf680fb31088c8e1ec00bbeba1f
SHA11a96be75a828f2f0dc4f07f6ce5e2138a05aa64b
SHA2560280e801914156055f67f030d6bed874e4a071c772d60e19758983c42181102b
SHA512c777d17ac4aa8712383a4c659a588f684ae88cc42f7c85551e260f2466f4318237e5b432b26f9c6002d9e8d2bfe43298f508625a39fc002aeb434d402e23e723
-
Filesize
1.3MB
MD582bcdae78be1a973c4627ff5bf92b218
SHA1325388e5c0a59dd56d23573e35f260ecd4ec46e6
SHA256e7251cdfe10bf0731137674fa26df6f0f2f50f2dc92b67607a5776ed7bb4ffb7
SHA51217d0b350a012a37126a67580b34488b548b97bf7dd7e71e280c5c484359b3f80eb4da67a4a7f725ae65b32f55ff0a3d78888e49d474a14b1f64caac48d3a3212