Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 22:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://blabberf.itch.io/flower-guardin
Resource
win10v2004-20240802-en
General
-
Target
https://blabberf.itch.io/flower-guardin
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FlowerGuardin.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4244 msedge.exe 4244 msedge.exe 4172 identity_helper.exe 4172 identity_helper.exe 5412 msedge.exe 5412 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 5644 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5644 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5340 FlowerGuardin.exe 5340 FlowerGuardin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4244 wrote to memory of 432 4244 msedge.exe 84 PID 4244 wrote to memory of 432 4244 msedge.exe 84 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 2584 4244 msedge.exe 87 PID 4244 wrote to memory of 4820 4244 msedge.exe 88 PID 4244 wrote to memory of 4820 4244 msedge.exe 88 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89 PID 4244 wrote to memory of 2200 4244 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://blabberf.itch.io/flower-guardin1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9dba846f8,0x7ff9dba84708,0x7ff9dba847182⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6384 /prefetch:82⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6328 /prefetch:12⤵PID:5400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6668 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,2514694793576658938,4926025117922450417,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6428 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4756
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5700
-
C:\Users\Admin\Desktop\Flower garden\FlowerGuardin.exe"C:\Users\Admin\Desktop\Flower garden\FlowerGuardin.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5340
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x504 0x5181⤵
- Suspicious use of AdjustPrivilegeToken
PID:5644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize696B
MD5a80e5071effeee8e1e61dfa8d1a977db
SHA16bff280b86d20cea6ddb743006f945714b2343d2
SHA2560f0e80e4f094ca033e400ba98b837e545aeb2ecb9ba9ba1ee4502cdf43d77e99
SHA512848b2ea55bea96c1920529e5f507b783ad741e3c7d2b0d64da67e1d54009da0cf6bfd0287558563595fdb879308d2cdcd735bbf69c826f866ce61dd784293113
-
Filesize
3KB
MD58463f3ac4bc96d572e403f7475c2aa51
SHA14b16bb792d6092a63c097dcea3e25310c5a0bf1b
SHA256899d9cd319ad62ec8629fa53cb382a7ed84f390bcfcd38fa8fe0d0a53f13083f
SHA51250be854fc49b5e51e99d7f3545d5e2582f417cb47c105ab7c17a615e70c47241aab9cc4d36497b4e9b4936128e0c53ce89229afb21765b48aee57a054481333f
-
Filesize
5KB
MD5163f48e2c79d6b124139e38a2a9b049b
SHA1b0e708025696203e08843a0da245c0c9f1f1e9c7
SHA2566b17ba98869ae9ab2a6bff3f4346b00ebd7a3ee0390049a998afe1e7e13d5c54
SHA512c2e372516ee5b1d487af47c132af3cb632eea29cd2aaca0af292e032709e3e32b048e538492fa785b951ef0231bfa614e25cffcde5e9800cc92a9c396c55b830
-
Filesize
6KB
MD5d4085bd376d683c512243798c232e4bf
SHA1563c1933debed1267ca1d5ce0194fc100035c718
SHA2569f755f9741ba8f7d199e18df52bf3561141bb953b89605bb6395a60b804c13e8
SHA512e5a39c4377125f5f3364421d4da730f1670af570e72ea345b74cb98355bed9da95822f978f5393f76b647eaa16b64d6f66939181f0bc2df6f6dc232338098959
-
Filesize
7KB
MD5e5296295b1e8f0a59d91c34688a33981
SHA17d3bb67909a508fa0fb0e12c55898053e81daa76
SHA256bd390210028fd74b05d92c6592d1bfe97ef1a4d0042ef118de496c951252b782
SHA512c8621cca69bb316c5ebe1f4fedf9cec4f12a8d7a89e791fbbbf9ca8937220bf05a3b707fe169f6022c4947d1d361ef1faed64332fcf04a905251a1b95446587a
-
Filesize
371B
MD54168eebb9ad62a1b1e181aef26ec2046
SHA1b9dd4f43947a5b01b43751dc00c00080489a9142
SHA256d55002d751b4241ee392c8dd8e7e13f63cd47117bd1c88aec52a3f54a1851062
SHA5123c6a63acef75782c1c7910444b52f7d37b749baf435997651a42c2e7724b4059a87189f8bcfec2001a5c4b34c5e39b7b41e75be311cdc952c2d46df3ba1fd154
-
Filesize
203B
MD52ab81cddf305d9888b2fdbd9fdb0860d
SHA161ee324e3dc1866d9d2039c760c9098b649d9c43
SHA256a99d866106ce9a8c7d0559d440c9a4eccff2ca49a41d7f3a92a6052fa876687c
SHA512c5e7f264fb6c73c835422ad35274c595b3fa9516a662c77d47a022199ba95949baca830a43fc7909e7a0cc5cd1dab77f687d5ab77e00b59535a1bbed81bb748e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52ea67bd7e5427bd1193baadec562d699
SHA192f524642b5542194d0fa97e10a357f0442c7962
SHA25693e511b28e26dace6a4ae0a018be836c9383c8f79158b6ebfeb807621e51484c
SHA5128eb0483393c1c92a885ab0d3d10b1fc15546a0256ad718a00d273531fa83c0b970cd94ff3f8f065b48b7cbf01f2a6e507eadf67af9166f74061b4dc2e609d615
-
Filesize
11KB
MD57d345be45268494618f90783bc7e8f21
SHA1e202ef4efbc5138503223659b728a3c85c9f14be
SHA256eadca41734705dd598b4be8952b174f596ef6380a28e83277780f1e89ccd7b4c
SHA512c1e5ccd5f3e80f4e975b5be8cfcd0e868b1e94f1b1754b80cd43ae3c92cf83b844e4068efa7a3fff515ed9209d2c7c15c2bedd75dfb548edf6e153e9d13f12c0
-
Filesize
9.2MB
MD59968204ae9fcb51951f1fbbd0bce04bb
SHA15e841a28ca9c717d309ecccb66b75adf3e59fb74
SHA25632bc6d827d20fedaff5221a90cdd56d8d88a40e00b8e1c6d5f7c0b2b95efc98b
SHA512090e3ab5be22284ba1b11013cb1a2d7c342b4c82259986cc6aeb674d601890ced52a0394a7cee90fa7ccfa3c0e43c559d7f9e84d38b6e3d551047e7262a08a0d