Overview
overview
9Static
static
3setup.exe
windows7-x64
4setup.exe
windows10-2004-x64
4$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$SYSDIR/frapsv64.dll
windows7-x64
1$SYSDIR/frapsv64.dll
windows10-2004-x64
1$SYSDIR/frapsvid.dll
windows7-x64
1$SYSDIR/frapsvid.dll
windows10-2004-x64
1$TEMP/beepa.bmp
windows7-x64
3$TEMP/beepa.bmp
windows10-2004-x64
7HELP/help_fps.htm
windows7-x64
1HELP/help_fps.htm
windows10-2004-x64
1HELP/help_general.htm
windows7-x64
1HELP/help_general.htm
windows10-2004-x64
1HELP/help_movies.htm
windows7-x64
1HELP/help_movies.htm
windows10-2004-x64
1HELP/help_...ts.htm
windows7-x64
1HELP/help_...ts.htm
windows10-2004-x64
1README.htm
windows7-x64
1README.htm
windows10-2004-x64
1changes.txt
windows7-x64
1changes.txt
windows10-2004-x64
1fraps.exe
windows7-x64
9fraps.exe
windows10-2004-x64
9fraps32.dll
windows7-x64
1fraps32.dll
windows10-2004-x64
1fraps64.exe
windows7-x64
1fraps64.exe
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 15:30
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$SYSDIR/frapsv64.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$SYSDIR/frapsv64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$SYSDIR/frapsvid.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$SYSDIR/frapsvid.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
$TEMP/beepa.bmp
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
$TEMP/beepa.bmp
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
HELP/help_fps.htm
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
HELP/help_fps.htm
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
HELP/help_general.htm
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
HELP/help_general.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
HELP/help_movies.htm
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
HELP/help_movies.htm
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
HELP/help_screenshots.htm
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
HELP/help_screenshots.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
README.htm
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
README.htm
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
changes.txt
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
changes.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
fraps.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
fraps.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
fraps32.dll
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
fraps32.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
fraps64.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
fraps64.exe
Resource
win10v2004-20240426-en
General
-
Target
HELP/help_screenshots.htm
-
Size
554B
-
MD5
834e553c909b7600700f25fcdfe8046a
-
SHA1
3d8a844cd24e519f73e6e14c83464ca801188aa5
-
SHA256
b2bebc38395e4678c78af793b1c5ad214a3f832fbe860dedb0d8db36118350fe
-
SHA512
245dce23051e67dc786ef07bb0dcdc2c98bcad859bc4b4bc522a64b72db28a7d0fb657df7b27a7d0f3ab7612a11275ba04307847eb7836917b39d25517221205
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3560 msedge.exe 3560 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 4312 identity_helper.exe 4312 identity_helper.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 116 224 msedge.exe 83 PID 224 wrote to memory of 116 224 msedge.exe 83 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 2608 224 msedge.exe 84 PID 224 wrote to memory of 3560 224 msedge.exe 85 PID 224 wrote to memory of 3560 224 msedge.exe 85 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86 PID 224 wrote to memory of 2528 224 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\HELP\help_screenshots.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3ad546f8,0x7ffa3ad54708,0x7ffa3ad547182⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,18300204702564312147,12292883207396507141,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1952,18300204702564312147,12292883207396507141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1952,18300204702564312147,12292883207396507141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,18300204702564312147,12292883207396507141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,18300204702564312147,12292883207396507141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,18300204702564312147,12292883207396507141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,18300204702564312147,12292883207396507141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,18300204702564312147,12292883207396507141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,18300204702564312147,12292883207396507141,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,18300204702564312147,12292883207396507141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,18300204702564312147,12292883207396507141,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,18300204702564312147,12292883207396507141,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD50f9f997548febd966f3ab726754cb529
SHA186e44fec51ac518f80124bf71050e51df068cfa8
SHA256496b4c47a5a029ca365ea5ace67dc6f37816d4ad7fe4dd9e96b03419a2051c90
SHA512723916b49ecb5aaea5748d9ccf86ea76a12bb492e15da99093e5ac28372124a3852fde4bfb8f0dfd5ff278936bd458c058fca3a2db8376bd368b2d4a32a8e9a9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b8a96744-305c-488e-bbe9-8a7a1b345b75.tmp
Filesize5KB
MD5f125745c7756599fd00355aa39a90f9b
SHA128b8676e64d7d8c73ce0716d29b27f4324274e58
SHA256583171e29fa3847a77454401ae6891f6569fdeaa7dd3a8f277b3e5932e13ed88
SHA512396a3063d23b1dc068e168bce8fa8ccf21bae357fb70d613be9aa22fb8e0a75de2cb7e5373a8302fb226e8d8aada815fb47db4d8f1f2cc7adaf1b3b1a229ccd3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59fd4bc5399ecad696229a3360f025053
SHA1f1f73523bde27426dd28efefffe8119488e9547d
SHA2569657a9dce5b32b272f234bd0f51f0786906e866fdf32c00da66013a048d61288
SHA5128ccc855f335373380f133cf15822027c974afdca1236609c41fd1958f86fda5d67af5aee36ae187f271117e5af17906de7a0ae9e3a84479032243105dd2bc177