Overview
overview
6Static
static
3win-airplay.zip
windows11-21h2-x64
1win-airpla...be.exe
windows11-21h2-x64
3win-airpla...ay.exe
windows11-21h2-x64
3win-airpla...ur.msi
windows11-21h2-x64
6win-airpla...64.msi
windows11-21h2-x64
6win-airplay/SDL2.dll
windows11-21h2-x64
3win-airpla...ay.exe
windows11-21h2-x64
3win-airpla...58.dll
windows11-21h2-x64
3win-airpla...58.dll
windows11-21h2-x64
3win-airpla...56.dll
windows11-21h2-x64
4win-airplay/cairo.dll
windows11-21h2-x64
3win-airpla...ig.dll
windows11-21h2-x64
3win-airpla...pe.dll
windows11-21h2-x64
3win-airpla...nv.dll
windows11-21h2-x64
3win-airpla...st.dll
windows11-21h2-x64
3win-airpla...l2.dll
windows11-21h2-x64
3win-airpla...55.dll
windows11-21h2-x64
3win-airpla...ld.ttf
windows11-21h2-x64
3win-airpla...ht.ttf
windows11-21h2-x64
3win-airpla...ar.ttf
windows11-21h2-x64
3win-airpla...ld.ttf
windows11-21h2-x64
3win-airpla...ht.ttf
windows11-21h2-x64
3win-airpla...ld.ttf
windows11-21h2-x64
3win-airpla...ht.ttf
windows11-21h2-x64
3win-airpla...um.ttf
windows11-21h2-x64
3win-airpla...ar.ttf
windows11-21h2-x64
3win-airpla...ic.ttf
windows11-21h2-x64
3win-airpla...-3.dll
windows11-21h2-x64
3win-airpla...-5.dll
windows11-21h2-x64
3win-airpla...��.url
windows11-21h2-x64
1Resubmissions
03-08-2024 19:46
240803-yg8nestbqr 1003-08-2024 19:44
240803-ygbcxsxhld 603-08-2024 19:41
240803-yd6pnaxgpa 6Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-08-2024 19:41
Static task
static1
Behavioral task
behavioral1
Sample
win-airplay.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
win-airplay/Blueberry-Airplay-Youtube.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
win-airplay/Blueberry-Airplay.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
win-airplay/Bonjour.msi
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
win-airplay/Bonjour64.msi
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
win-airplay/SDL2.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
win-airplay/airplay.exe
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
win-airplay/avcodec-58.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
win-airplay/avformat-58.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
win-airplay/avutil-56.dll
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
win-airplay/cairo.dll
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
win-airplay/fontconfig.dll
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
win-airplay/freetype.dll
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
win-airplay/libiconv.dll
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
win-airplay/libplist.dll
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
win-airplay/libxml2.dll
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
win-airplay/postproc-55.dll
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
win-airplay/resources/OpenSans-Bold.ttf
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
win-airplay/resources/OpenSans-Light.ttf
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
win-airplay/resources/OpenSans-Regular.ttf
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
win-airplay/resources/OpenSans-SemiBold.ttf
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
win-airplay/resources/OpenSansCondensed-Light.ttf
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
win-airplay/resources/Roboto-Bold.ttf
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
win-airplay/resources/Roboto-Light.ttf
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
win-airplay/resources/Roboto-Medium.ttf
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
win-airplay/resources/Roboto-Regular.ttf
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
win-airplay/resources/elements_basic.ttf
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
win-airplay/swresample-3.dll
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
win-airplay/swscale-5.dll
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
win-airplay/蓝莓投屏 官网.url
Resource
win11-20240802-en
General
-
Target
win-airplay/avutil-56.dll
-
Size
632KB
-
MD5
77728494071d91965eafcb429f7f5079
-
SHA1
3ff9000c759e41fcc71cd05fad6162ce94b1e787
-
SHA256
1a2c893c4f3abd0f5f0536e49149d4ef410b307d9285d687bc5a25b15db88df1
-
SHA512
74b6c71c52b7f3e42684ac613aa8754ac7a185eda59bc33964d8d637f4bca4a15a0bc7f39791f56f3ac10079716956970d3a6b51f1da1aa427dbcd30ffe7199b
-
SSDEEP
12288:LJzDgD5bRZUMvyNrgKhC7obcuNqE+ZlixX:LJzU5bIMaN8Kk
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Windows\SystemTemp chrome.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 476 4820 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133671878635414701" chrome.exe -
Modifies registry class 1 IoCs
Processes:
MiniSearchHost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 4356 chrome.exe 4356 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe Token: SeShutdownPrivilege 4356 chrome.exe Token: SeCreatePagefilePrivilege 4356 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe 4356 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MiniSearchHost.exepid process 2260 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rundll32.exechrome.exedescription pid process target process PID 3712 wrote to memory of 4820 3712 rundll32.exe rundll32.exe PID 3712 wrote to memory of 4820 3712 rundll32.exe rundll32.exe PID 3712 wrote to memory of 4820 3712 rundll32.exe rundll32.exe PID 4356 wrote to memory of 4900 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 4900 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 3768 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1284 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 1284 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe PID 4356 wrote to memory of 476 4356 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\win-airplay\avutil-56.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\win-airplay\avutil-56.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 4803⤵
- Program crash
PID:476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4820 -ip 48201⤵PID:3768
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2260
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff93ed3cc40,0x7ff93ed3cc4c,0x7ff93ed3cc582⤵PID:4900
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1764,i,9641717158812802173,6918331810263903111,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1760 /prefetch:22⤵PID:3768
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2028,i,9641717158812802173,6918331810263903111,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2132 /prefetch:32⤵PID:1284
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,9641717158812802173,6918331810263903111,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2200 /prefetch:82⤵PID:476
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,9641717158812802173,6918331810263903111,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1544
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,9641717158812802173,6918331810263903111,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:1364
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4436,i,9641717158812802173,6918331810263903111,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3764 /prefetch:82⤵PID:1208
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4580,i,9641717158812802173,6918331810263903111,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:1812
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4960,i,9641717158812802173,6918331810263903111,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4520 /prefetch:82⤵PID:4412
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5112
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
101KB
MD57dd9c483b39462e4678533fc28e3dcfa
SHA18ee84f5ffdae979d69f0954b887435c699026a45
SHA256c25cd89652d3311f1360c1f410f00434604b23b8e93711fc491177208810be77
SHA512da5cf69fb3c5f77c598fc52ee7697ab34a3a526a146d88c8f203e85fb353c418a75b209a0ef2f1315f9fa1679451d8e0970de6b0b8eb20f476ed93ec79aea10d
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5d12e797f18cb79137ad12b5e5139e1b8
SHA1f15fb437b1be86b714e278ce927b315fa0e16ea3
SHA256afb0f4a0229174f8118ab512b569fdb9eb3ebb0389cb11c9f4a0a2aa88ec258b
SHA512f6e8f99bcd0ecff7683c8e56fa2ffa3fdff16d6c17a2066b36bc3d78e2838130b5b23059a239b29a7ebdd0b5ca36b3f9cf388945bf1aad50a3f91cb8091223cd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e