Overview
overview
6Static
static
3Craftomati...OM.url
windows7-x64
6Craftomati...OM.url
windows10-2004-x64
3Craftomati...OM.url
windows7-x64
6Craftomati...OM.url
windows10-2004-x64
3Craftomati...01.exe
windows7-x64
1Craftomati...01.exe
windows10-2004-x64
1Craftomati...32.dll
windows7-x64
1Craftomati...32.dll
windows10-2004-x64
1Craftomati...64.dll
windows7-x64
1Craftomati...64.dll
windows10-2004-x64
1Craftomati...64.dll
windows7-x64
1Craftomati...64.dll
windows10-2004-x64
1Craftomati...al.dll
windows7-x64
1Craftomati...al.dll
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23-02-2024 14:12
Static task
static1
Behavioral task
behavioral1
Sample
Craftomation.101/IGG-GAMES.COM.url
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Craftomation.101/IGG-GAMES.COM.url
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Craftomation.101/PCGAMESTORRENTS.COM.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Craftomation.101/PCGAMESTORRENTS.COM.url
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
Craftomation.101/game/Craftomation101.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
Craftomation.101/game/Craftomation101.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
Craftomation.101/game/OpenAL32.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Craftomation.101/game/OpenAL32.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
Craftomation.101/game/sdkencryptedappticket64.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Craftomation.101/game/sdkencryptedappticket64.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
Craftomation.101/game/steam_api64.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Craftomation.101/game/steam_api64.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
Craftomation.101/game/wrap_oal.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Craftomation.101/game/wrap_oal.dll
Resource
win10v2004-20240221-en
General
-
Target
Craftomation.101/PCGAMESTORRENTS.COM.url
-
Size
202B
-
MD5
420715a04de8367bb8d37d57ce1d6d41
-
SHA1
710369a636391e43be7149416d8e9b390863babb
-
SHA256
c4d6ac03d1b51af3f4127bdd12f2317da8ebf4a7f20402f2139c61d5cf10ab23
-
SHA512
8737cec4730f412c18e508076d9fb7af2ab10b4b1637c70c2f76c1c6ca7bca27021cbe56dc3305a4ea7704f7ac2c6e005d02c605a4e7f9b0a709bb94cfc7f457
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 4904 msedge.exe 4904 msedge.exe 4496 identity_helper.exe 4496 identity_helper.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe 3392 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 4904 5008 rundll32.exe 88 PID 5008 wrote to memory of 4904 5008 rundll32.exe 88 PID 4904 wrote to memory of 856 4904 msedge.exe 90 PID 4904 wrote to memory of 856 4904 msedge.exe 90 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 2572 4904 msedge.exe 92 PID 4904 wrote to memory of 4332 4904 msedge.exe 93 PID 4904 wrote to memory of 4332 4904 msedge.exe 93 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94 PID 4904 wrote to memory of 928 4904 msedge.exe 94
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\Craftomation.101\PCGAMESTORRENTS.COM.url1⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pcgamestorrents.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9bb0846f8,0x7ff9bb084708,0x7ff9bb0847183⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,1676081430803558672,7390782808134342698,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:23⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,1676081430803558672,7390782808134342698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,1676081430803558672,7390782808134342698,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:83⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,1676081430803558672,7390782808134342698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:13⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,1676081430803558672,7390782808134342698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:13⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,1676081430803558672,7390782808134342698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3876 /prefetch:13⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,1676081430803558672,7390782808134342698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:13⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,1676081430803558672,7390782808134342698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:83⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,1676081430803558672,7390782808134342698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,1676081430803558672,7390782808134342698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:13⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,1676081430803558672,7390782808134342698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:13⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,1676081430803558672,7390782808134342698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1960 /prefetch:13⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,1676081430803558672,7390782808134342698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:13⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,1676081430803558672,7390782808134342698,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5944 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d62cefeb0c8fbab806b3b96c7b215c16
SHA1dc36684019f7ac8a632f5401cc3bedd482526ed7
SHA256752b0793cf152e9ea51b8a2dc1d7e622c1c1009677d8f29e8b88d3aa9427dd01
SHA5129fc3968fec094be5ca10a0d927cb829f7f8157425946ebd99a346b7e63c977cb3f37560af1a4bc8f87ab19b43b3ed86fd5b37f89d1a9b2dc86e3c73142c3065b
-
Filesize
152B
MD57ee1c6757da82ca0a9ae699227f619bc
SHA172dcf8262c6400dcbb5228afcb36795ae1b8001f
SHA25662320bde5e037d4ac1aa0f5ff0314b661f13bb56c02432814bffb0bd6e34ed31
SHA512dca56a99b7463eddf0af3656a4f7d0177a43116f401a6de9f56e5c40a49676cea5c38b6c458f426c6bff11165eec21104cfa9ca3e38af39d43188b36d3f22a0f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\34181cd7-0efb-409a-9ed2-66e2576fe8b4.tmp
Filesize6KB
MD5de35233b4692e6eb01593d715b87454d
SHA13fceea73f08ea20e91283bc5549d86462c10b2d3
SHA256f4168c5a60e6c31b671aad73aebede09e0b172c2a8c4ed83ffe5816862dac1f0
SHA5125d5c788b7cbee53373e3a1c83467d257943eefedcf5fd87b7516cd7e8991f0415546d6c0605cd262edb6f23b8d9312cfd4abec42e39dc7072dd5594285c3fc0b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD577e5944777eb1f8760d88c731e95dfb8
SHA1e8fc2312ad310863bdae8a663fa34520332ca7bb
SHA256943e08c59e0ac8fb36893c59eabaf87c3fdc8b489830531e0c7cdd16f54a0aa8
SHA512ad00d46808b49317c40ab90a6803c7ef597a76d35799623c08ad8e3a3fdc6e84328ef22026d27f66245f403c268b590d374d1f450a39f119a848b4c29d0b3112
-
Filesize
1KB
MD5db21330423b79cd82cc1e03b910d4179
SHA1fcd057f79f1f14ededc431b8c25dd320f0a73a0e
SHA256b91241f5aef9314e00ab030ca8d94d463e731faa5cf49263de494f157544489d
SHA5127d921d34c63b9a0ad5ecb13212dccaf8a6a2b3eb157f78dd7570143875f94a93b2a7b9fb670c28fbc9bcc33b19557257e4d227e81e2ee0d8e8bd1be0ccb36712
-
Filesize
7KB
MD52ec18f6eb16cad2c91d2fed2a517bb53
SHA106a84dda40e22094ebc55419c789443b5ec81606
SHA2563f12a18d5b0440699a2dddc5876de574a3ddea4208b62bce4c9fb9dcbb7fe5f0
SHA512a65ba8659dc9aacbf97b2c167d9494c9c71c2cb70b0c05bc0263afd06e9c3e4e7658eb4049b016ad9ccb97c15412758c2530e5d43cb78d6c73aa2e9e9039f96c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57821aeb4b4b8358010fdd3adca2fc461
SHA11faf834a7a486153d8a73aa853425c64fc0787d8
SHA256bdaa9ae00abd1d0a1bbb7e2324b1319e3277519740e735115ef4a3969295eb4c
SHA512d8f6aa2eff6cd7ce4d2500aa685d0b44cee20f8eb9bb52280d1b8fd301c495f140fbc2107a5832d161650cb3eb963b8fe696ed69ef801511aac032a431a03c2f