Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 05:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.atlassian.com/software/jira/service-management?utm_medium=email&utm_source=service-desk_email-notification_server&utm_campaign=service-desk_email-notification_server
Resource
win10v2004-20240508-en
General
-
Target
https://www.atlassian.com/software/jira/service-management?utm_medium=email&utm_source=service-desk_email-notification_server&utm_campaign=service-desk_email-notification_server
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133645444012566031" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4216 chrome.exe 4216 chrome.exe 4556 chrome.exe 4556 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4216 wrote to memory of 416 4216 chrome.exe 81 PID 4216 wrote to memory of 416 4216 chrome.exe 81 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 1468 4216 chrome.exe 82 PID 4216 wrote to memory of 744 4216 chrome.exe 83 PID 4216 wrote to memory of 744 4216 chrome.exe 83 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84 PID 4216 wrote to memory of 4136 4216 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.atlassian.com/software/jira/service-management?utm_medium=email&utm_source=service-desk_email-notification_server&utm_campaign=service-desk_email-notification_server1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1790ab58,0x7ffd1790ab68,0x7ffd1790ab782⤵PID:416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1872,i,2074660726002960908,2395960993068582111,131072 /prefetch:22⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1872,i,2074660726002960908,2395960993068582111,131072 /prefetch:82⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2200 --field-trial-handle=1872,i,2074660726002960908,2395960993068582111,131072 /prefetch:82⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2796 --field-trial-handle=1872,i,2074660726002960908,2395960993068582111,131072 /prefetch:12⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2804 --field-trial-handle=1872,i,2074660726002960908,2395960993068582111,131072 /prefetch:12⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4464 --field-trial-handle=1872,i,2074660726002960908,2395960993068582111,131072 /prefetch:12⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 --field-trial-handle=1872,i,2074660726002960908,2395960993068582111,131072 /prefetch:82⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1872,i,2074660726002960908,2395960993068582111,131072 /prefetch:82⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 --field-trial-handle=1872,i,2074660726002960908,2395960993068582111,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360B
MD5b68e79ecdea0cbeb229a964938481fc1
SHA18f702cda4e9ccf76bd7a1fb8df174fb306585286
SHA2567e60a02a0805e6f2547a6a7b721028bf4ebb2dfd3dc0687a590e6cb9db940a64
SHA5123d44b51a43b2705a090d076ddca4cb00439d168d459a0da154374d3d77e519a328d5e10484e0d465d76321fcb42a3cce903980da78a69370ae529bd7078de134
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\436e45d7-47c1-41c8-927b-827bb2097191.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD50359afcfa201a1593bc3b4433f50d106
SHA15dcac0e4168ffb3e9dbde636ce96150676a3aa86
SHA256d262d57872dd6afcda46db0a6d835de88b5c93651a14721db37ec9d8205cffcb
SHA512ffdc4d8af17e724363adf18658a20016614b3329d008ba75180705b15946745c79033f5468b542b401f13583d81801176e7a7feedd26676a04d9056b1db3b095
-
Filesize
2KB
MD5c7e6dbcb99fddfbf1d2905347ade1c89
SHA1b2cdf74dfe52740ef303143e4d11407cff243833
SHA25696b63003f4e4b61152cd56b81300ef461a3e24cf86db1b2be6050c454fda56bd
SHA512529c3c44ec7c7ce209bc3dc9b62602d4940787f256d45f2bdd2c24fa7d0b377ea27acdd12c0eb1a7b90f6d0615c45b47be99fa594d5a446c343b03f4da2a6dcd
-
Filesize
2KB
MD5241b1c84ad295c69caf79bd7872ede19
SHA188a926b0b2cf9bc6447b745dc006cdea770b1e4a
SHA2566c3b0bd5f90374d3da9b1bee193bc3c9c688bd25f285e3dd7204981107f89e35
SHA512855bef5593e3112b7fd92d21d6d09e110994b049db00feb265644ccbc87ebdad3173f1806c6283352f7faa038f99d94b4d900a6d7578fa18f183e6c9034ceaed
-
Filesize
2KB
MD5c7b20f39145afd67b8f83e4278b84690
SHA1c077910a48c608565ba1f48eef526de424ca6e74
SHA25673ef42e62c87f933fe43f392e9588f5017c632e11d4935c5ea9835c30070f76b
SHA512ae45944090703af4d8da52d7a664a89a9ada0a8431e69e3ab1e337efe693fcc2f4e302dd8eb490f1759acbd6cfdaadd69121ee2ba965311b36e3259671aad03f
-
Filesize
7KB
MD5b37b546c9b2237d2061ef3b7a86d29dd
SHA102c15d7581abeb3bcaac68c2e2a64c9f8540912d
SHA2563ae22197d7633065d9d304b3d8f48d531f5c0a5e9dc6ea127637ac28c1da17fb
SHA512e5d1a4ad9c44d099a9614939c209dc0def802cec7379d0d0650926f6385f93be1a5535d5305fec5a38682f60c8765e153aa58653150611ede87cb4acb02d1f71
-
Filesize
7KB
MD5da963739c9bdf65913f3d2518e35c2fc
SHA198beeb6a6468a8190052f2bbf5bb825d4e778a34
SHA256606b44d45dccaf4d8ba2539286ecc46e2032f031902ff80f5cd158d02c5b6cc6
SHA51269273644b2483304d8985409d6a148932d455d67e8cb8e22a22a02e18e23835a71d294c70dbfd10b3513fe6f7b5e2ff22cc56124beed800f3f39ed0ea451c0ac
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\274d1d1f915fafc8567179954271fe742319fe99\index.txt
Filesize192B
MD521e514c6980a2cfe0f8aabc66b232c89
SHA13dac7971f04a0ffbbe33df5890875b3a38b128f5
SHA2561dd07e26771cd07feffbc512e2df6eb59ac96115cc3a0d5268c7b91a49b71603
SHA5126d126cc6c86804d5fa1aa347eea8fa32653144a3404a3a41ad88a9bfd2d8397c10ab6085f33be61c91d840da22ad5dfb6b0976676eb76eebfe3414898ee4787c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\274d1d1f915fafc8567179954271fe742319fe99\index.txt
Filesize185B
MD5d47b39f0eb354996b20823991f2ca390
SHA184ccc537491ab084fb853ac1804e4757157a9bd9
SHA256ecef4136cd74aaa106f22c5e7eadbaaa1a61721452998e7b9fd6a03b7267dbed
SHA51213a9373fed9c9fa3092a3767734766f29974a1c3a5dfbeb1bf1494f2dd9f94149a24a193d4d52f70c1aa5f26cf30d3fae312ff9f26fd7cd7b675404ab7cc9d16
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\274d1d1f915fafc8567179954271fe742319fe99\index.txt~RFe576c56.TMP
Filesize126B
MD515b2b42d62fdc1a26c50395d4f1441e8
SHA1de252335442b182fee0ae7da7ef5f91bd56c3b0b
SHA256d22549aad72a20511c1c57bc7da122f1b3c35451651336bae5df7ca0440a488e
SHA5129f0b982efa77be670bfa61fc062968776020bf4488ae20b71bd499b2ecf93fbc91a0c6af704204df4588cd50d683c25e0a9e18010f2b6d08c9483086eca9cee8
-
Filesize
129KB
MD510a6dda0bf357f90666ac7917a9c391f
SHA1ed00e5badd2aac47a86a0a01e9aeb962cc9099d0
SHA2563820d82eafb83553f869bba9c85888655aa3ae41b1bc949e7337c33a79d8c98b
SHA512375a08565f3d7805ba39ea241be28e989ccc16e8b6aa5a718fb4f46cbe087bc78bbc9e6b1a2b79d834fc1244f3bdcbf6c6e62ad6d917bb788d263fe133b7095f