Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 09:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://jfrcycle.com
Resource
win10v2004-20241007-en
General
-
Target
https://jfrcycle.com
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 14 href.li 15 href.li -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133766562234766222" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3364 chrome.exe 3364 chrome.exe 2396 chrome.exe 2396 chrome.exe 2396 chrome.exe 2396 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe Token: SeShutdownPrivilege 3364 chrome.exe Token: SeCreatePagefilePrivilege 3364 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe 3364 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3364 wrote to memory of 2728 3364 chrome.exe 83 PID 3364 wrote to memory of 2728 3364 chrome.exe 83 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1460 3364 chrome.exe 84 PID 3364 wrote to memory of 1372 3364 chrome.exe 85 PID 3364 wrote to memory of 1372 3364 chrome.exe 85 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86 PID 3364 wrote to memory of 3336 3364 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://jfrcycle.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9d06acc40,0x7ff9d06acc4c,0x7ff9d06acc582⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1832,i,9055286803351747823,2107269195296287676,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1824 /prefetch:22⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2016,i,9055286803351747823,2107269195296287676,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2424 /prefetch:32⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2120,i,9055286803351747823,2107269195296287676,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2580 /prefetch:82⤵PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,9055286803351747823,2107269195296287676,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,9055286803351747823,2107269195296287676,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3848,i,9055286803351747823,2107269195296287676,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4420 /prefetch:12⤵PID:848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4628,i,9055286803351747823,2107269195296287676,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4780,i,9055286803351747823,2107269195296287676,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4840 /prefetch:82⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3212,i,9055286803351747823,2107269195296287676,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD570f8edb84311618434a51b382d23cabd
SHA153e4b41de6391d71eb3a1326859c158cee3254c9
SHA2569cecd06cfb6e8ed257f48b67f0c2147b59771576e2653b4dade888b4392caa2b
SHA51205a31a7cdab52c31ca9255c85d703c6b4e7f500dc83763d2709bf1749261524a00f5a3321313e1c7d1d2cffafae5c1bebf08542e5f274d19a28e81cfa27d19c6
-
Filesize
1KB
MD588bde706c028c7eb1ddff38411f6c2fc
SHA15ca1028a52c8f6c28aa5c61d8de2e98c546229b0
SHA25639efced22a5813ad0b644f10d4d67d1d49e9a27c0939bf0703837944cc4a3cbc
SHA5129e05810abc18cc54d43782fd00e6676ae546e5a47b78317f439fc21d0513b210f9df1f1243f57b435472d6ca20595577f93d34b730163ce1adea0b0988c94d40
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD57c7d34e8a2a20216c234bb0c92a1d385
SHA1a16aa2014687144378acbb8adcb5298551846625
SHA256e07d5234505588afa90063cc9b04e606de69a97cd3dbb71392365c3d8215a56a
SHA512b3b5a1295deb85ffcc3f264eab9a1e95b550aeb4b39ce4e324bc6cd36d20e24d57fb810bdf1b9aec55f75b39721fe8d1db94f3ecff87fd435bb9669aee971a8c
-
Filesize
9KB
MD56c3a9b0b501745860cd4b476920edd18
SHA1980c74f9a39fe4893b0b6085a3e7ece2d8e8406c
SHA256bd17ed852f6412ebfccca1fdfe61f1e2b278049e807f02b0a17ed17b501d0dfc
SHA5120006d75975135fe383a6b543429f2eb91319aec46b40326343eb11cb698a9b3568a88bfd014f09187cf287fcfbcb14e4ec9c35b841c3371de2f7d5569bb9690e
-
Filesize
10KB
MD5930c686968d101d87254603f66d7aa4f
SHA12c4fd5b7d6307d6df0d8631f82f2a182e106cb85
SHA256e1a8194f23a6bf4391e06aa72220ba9e0d786fc07f3264af3a7db55ccb4e48ba
SHA512dbbaa7550a826e2e7b78f613b45a17197baee36546334549c7e7455886ec5f2c7b3ddb5c836fd5a1586a8d4b0824ce6e507835ba2e7cb586e96b3fefc9bcfbd4
-
Filesize
10KB
MD588e9807a0c94f35458be0f96fcc31f0a
SHA10b443f9b3abc59c914ef8a135ddc741de60ee18e
SHA256451fd158e5599018ca22ac756aed9f4bab2611573971b7aa6cda27a6f3f543d0
SHA512e676569dcf2f45f10ae0790a43e922be7a47168d579a9cde8204fc3ea03ea05c7c7208778732cd5436146d633928d4afa18d6cbb81f060446c832d273b1c1f3b
-
Filesize
9KB
MD59b10bfb227b6b2ae993693152fafe7af
SHA1a1c80454858c3299ff81555497ccacc16a6437d6
SHA25638691578e6e428d14b8ad70ea91159ff1367405a12bff3134adb1a7c84a01fbb
SHA512c102858d67ca4308652d752a909473f46e0017b032a9f5c753b9f0db1b761186437e67c35f289ef08c9a4a5aff7dc2d59aad5c37fffdecfb554b3305b052366a
-
Filesize
10KB
MD5e3a0ee6519df6a31e83e4be7f9eed0ba
SHA1ce88108a6e3f71302d6b71408b817b9dc8e73cc2
SHA256d072f6945431de33a09359bb88c9f154385d0e02fc75edd0cb85eaba73dabdab
SHA512dc023c35b695bce6cc790f93d7157f57f5c51c0eea73a74c0ffb98852c5e37389ddfb24f6d09207bfb97c79427240a9180fc1c4cf9d8cf44ff58f3b4b41628be
-
Filesize
10KB
MD503ce7feabe4b3298000352fec37a2150
SHA11df8207ea611d5db4fe0f145707da11528c7cb6d
SHA256bdb1f9db1c0648dd82b5a888c0270561f0e32e8e6e5947e490f486707ba85ed1
SHA51283b61842ae3703dc9273f12397b8932a714b3023cb04e25fc51a59fc2dcffdad3dfb4e7f9f090211aee7687e1c64973912fab332d3c013c34810235fd4c7e962
-
Filesize
9KB
MD5c0dbfabda7eaea8289e2f1cb602df645
SHA1bc1009b33fc23c1dac171dd2b9971dd0c80e2316
SHA256f818201a20784b4c825100060491a90b572b0726982588e22151e182ba6c45d2
SHA51258943066e62e22bf3d53e090a4a34e549fb6eb9f3f6cd286149c0a8ce0cab59cf8ba2f7085ffa2dca3ce5b2f3462719fa0e315146616645fad4eb21bd5e522bb
-
Filesize
116KB
MD5d72f9e3738a6fe9a998a42f6711069f6
SHA1b0f567109fb459b724bb9a42049ab5fc76de32c9
SHA256ba075b568162b3f7a7b556a1de677377784a8fb8d6f95d9284e36173f64edc3a
SHA512c46aeec0c255d323c89ecefb5445f2f5e2aa795eda74528d275c2379fa5a242808a5d7d4af312c54b533979b9a75056604e37688ad0756c41cf69740bbafd2a6
-
Filesize
116KB
MD51cf46817943eed7845667a753ce21494
SHA1b13f889d432e6a2a3a6f1be15752e71a5b918739
SHA25611ffb879361455fd07c22aca9649d0ba050c10fae6660b8d82e4c73cf94bd140
SHA512980affa1857df151999cd833a390cfd7c1ffb877117b45581938d7f97627a8db5af75ad34f20151926af2c7085efbf8fe6f41283611a5f12f8c84e6eb09abae9