Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:06
Behavioral task
behavioral1
Sample
龙斗士魔盒5.1/更多软件下载.url
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
龙斗士魔盒5.1/更多软件下载.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
龙斗士魔盒5.1/飘荡软件.url
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
龙斗士魔盒5.1/飘荡软件.url
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
龙斗士魔盒5.1/龙斗士魔盒V5.1 简洁版.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
龙斗士魔盒5.1/龙斗士魔盒V5.1 简洁版.exe
Resource
win10v2004-20240508-en
General
-
Target
龙斗士魔盒5.1/龙斗士魔盒V5.1 简洁版.exe
-
Size
930KB
-
MD5
aea347cc28d1487b102197eef6cc9d10
-
SHA1
6f546739add32e8fce22ed4e3ce05a833d1ac785
-
SHA256
873416540bf68099e52ff4e19645f0d2f54ccbc5a2e9ab38d8c5d56b82734dac
-
SHA512
f806d1b60ce697a222b02031348f53f3ca40ca2b523b601daa032b92cfb74b2238d1b6722ca852c8fb8418317dc76de792b001748e9c653ce992f52f1161602b
-
SSDEEP
24576:/65ciRHpPUbWN5vM2I2F1qyBo0IzVHZyyaAk:+ciRHpPDnJO0GVaP
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral6/memory/2544-0-0x0000000000400000-0x000000000064C000-memory.dmp upx behavioral6/memory/2544-3-0x0000000000400000-0x000000000064C000-memory.dmp upx behavioral6/memory/2544-7-0x0000000000400000-0x000000000064C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 440 msedge.exe 440 msedge.exe 1560 msedge.exe 1560 msedge.exe 4668 identity_helper.exe 4668 identity_helper.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
龙斗士魔盒V5.1 简洁版.exepid process 2544 龙斗士魔盒V5.1 简洁版.exe 2544 龙斗士魔盒V5.1 简洁版.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
龙斗士魔盒V5.1 简洁版.exemsedge.exedescription pid process target process PID 2544 wrote to memory of 1560 2544 龙斗士魔盒V5.1 简洁版.exe msedge.exe PID 2544 wrote to memory of 1560 2544 龙斗士魔盒V5.1 简洁版.exe msedge.exe PID 1560 wrote to memory of 2152 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 2152 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 4656 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 440 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 440 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe PID 1560 wrote to memory of 468 1560 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\龙斗士魔盒5.1\龙斗士魔盒V5.1 简洁版.exe"C:\Users\Admin\AppData\Local\Temp\龙斗士魔盒5.1\龙斗士魔盒V5.1 简洁版.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.10pan.com/space_ÄÎõ.html2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc5f7a46f8,0x7ffc5f7a4708,0x7ffc5f7a47183⤵PID:2152
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9931127566931119212,5640095697769473465,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:23⤵PID:4656
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,9931127566931119212,5640095697769473465,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,9931127566931119212,5640095697769473465,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:83⤵PID:468
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9931127566931119212,5640095697769473465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:13⤵PID:2192
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9931127566931119212,5640095697769473465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:13⤵PID:2416
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9931127566931119212,5640095697769473465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:13⤵PID:4432
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,9931127566931119212,5640095697769473465,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:83⤵PID:2000
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,9931127566931119212,5640095697769473465,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9931127566931119212,5640095697769473465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:13⤵PID:3572
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9931127566931119212,5640095697769473465,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:13⤵PID:3164
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9931127566931119212,5640095697769473465,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:13⤵PID:4148
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9931127566931119212,5640095697769473465,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:13⤵PID:3492
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9931127566931119212,5640095697769473465,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1408 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5d4c3a71699f81197c52cb394a073ae9b
SHA16ef9b6351cf13f99f12bab5c1901a862fabfa6d3
SHA256271e5eba18fceb6956ff8a0f37aaee3f3b5d7895241978bf7cf650b481729e33
SHA5120f524e7dac5da6c6a37f8cb129bcfa06af154ebbe852a21f811e65b5c40ba1ed0813cae4a51240b1f1b055cd21098e1ce01d8a23aa854462b80326c4c20a1ab3
-
Filesize
821B
MD585cd2fb4699b20f4b7ce410fee6370a0
SHA1b3daefb1f38add28ac672e91353ad66b5c8f3864
SHA2561422aaacb1caff435426895b7bc686bb91791a4f0a3f699b114cf08609cc6438
SHA5122f5470c291ca5356e3c1f6f0b628f5f069f59abd40e0bd28d6a55e1e7fd5a80c1f2f62b3d324e47b750fc64b342840d022e80c249b4003adcf907f2f5060d84e
-
Filesize
5KB
MD54e007a8161a6c77485aba2449b132eb5
SHA13264d0f2427c4e1ab8a0387e96a93e0a93458f0e
SHA25658c55de47536064536d3c9717e2144d33f05b45400ea1c9f173ea466c83da7b7
SHA512fe21427f7a051681e30747bac3511fba73903a97f183b68eec2849d9c039a3f2c4b2952aaff06713370814c8f0714d8b61bf6d5441ac6c14e6e419958d81b1e7
-
Filesize
6KB
MD5d7233e3d59a38ad50e1a160169334a8e
SHA1e0a054435eec0cbce8f1f781b671c39527dfc99c
SHA256ca4cf29787faa10085b1f9e462aae3dae9b0f98c5ff5ca155ad8bf7d2a8f15a4
SHA51210e6f2316de15c36bc0cc5459c6762739429d9e2cac7f3db4ebbd90a5b95ad39f5dac3957e516071b6b8a3d6bd7208aab6189f30bcfaf2d1c959b77a8ca17893
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5daa340c8c1b399b2874fe53bf23efd6d
SHA13ebff2a9f9266f824fd38144508d7af186c729f5
SHA25661b682aa1f06d15bd65b51a588fa8695bd8c8757ec35ca78a63e56a342dacc5f
SHA512ef80de4b5acfb03e0ee3dc7eb45d288c2179fdbc0753b1bc4819229035f1e0bad7103c4a52c7f72f75dafe381123765b3d476ce69eadd481d5c79d2744b906c9
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e