Overview
overview
7Static
static
7vpnclient/28ip.html
windows7-x64
3vpnclient/28ip.html
windows10-2004-x64
3vpnclient/gonggao.htm
windows7-x64
3vpnclient/gonggao.htm
windows10-2004-x64
3vpnclient/ip.html
windows7-x64
3vpnclient/ip.html
windows10-2004-x64
3vpnclient/ssm.html
windows7-x64
3vpnclient/ssm.html
windows10-2004-x64
3vpnclient/top.htm
windows7-x64
3vpnclient/top.htm
windows10-2004-x64
3vpnclient/...p.html
windows7-x64
3vpnclient/...p.html
windows10-2004-x64
3vpnclient2/28vpn.exe
windows7-x64
7vpnclient2/28vpn.exe
windows10-2004-x64
7vpnclient2....0.exe
windows7-x64
7vpnclient2....0.exe
windows10-2004-x64
vpnclient2....0.exe
windows7-x64
7vpnclient2....0.exe
windows10-2004-x64
7vpnclient2...ao.htm
windows7-x64
3vpnclient2...ao.htm
windows10-2004-x64
3vpnclient2/top.htm
windows7-x64
3vpnclient2/top.htm
windows10-2004-x64
3top.htm
windows7-x64
3top.htm
windows10-2004-x64
3vpnclient2...t2.lnk
windows7-x64
3vpnclient2...t2.lnk
windows10-2004-x64
6vpnclient2...op.htm
windows7-x64
3vpnclient2...op.htm
windows10-2004-x64
3vpnclient2...op.htm
windows7-x64
3vpnclient2...op.htm
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 19:22
Behavioral task
behavioral1
Sample
vpnclient/28ip.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
vpnclient/28ip.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
vpnclient/gonggao.htm
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
vpnclient/gonggao.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
vpnclient/ip.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
vpnclient/ip.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
vpnclient/ssm.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
vpnclient/ssm.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
vpnclient/top.htm
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
vpnclient/top.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
vpnclient/yyvpnip.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
vpnclient/yyvpnip.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
vpnclient2/28vpn.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
vpnclient2/28vpn.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
vpnclient2/28vpn_en_5.0.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
vpnclient2/28vpn_en_5.0.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
vpnclient2/28vpn_zh_5.0.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
vpnclient2/28vpn_zh_5.0.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
vpnclient2/gonggao.htm
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
vpnclient2/gonggao.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
vpnclient2/top.htm
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
vpnclient2/top.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
top.htm
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
top.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
vpnclient2/vpnclient2.lnk
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
vpnclient2/vpnclient2.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
vpnclient2/复件 (2) top.htm
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
vpnclient2/复件 (2) top.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
vpnclient2/复件 top.htm
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
vpnclient2/复件 top.htm
Resource
win10v2004-20240802-en
General
-
Target
vpnclient2/复件 (2) top.htm
-
Size
990B
-
MD5
72defc966eb83b40d830b3bc66354d94
-
SHA1
c83173bfd34ab77873c01c76446d939fe22d364e
-
SHA256
64d69ca7b9efa905812324a8d8ea59bdd7f124624e541a6a4ae0a8490e1e381e
-
SHA512
137d6ae33ae11091ba863a7590a5b3bc8f15012a3a93654f553a138d3b10820d854831307a8a0ddafeecdd84fd8ea88d4e8a52790e8d97b8c4a27086e8d61e9d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 1172 msedge.exe 1172 msedge.exe 1844 identity_helper.exe 1844 identity_helper.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1172 wrote to memory of 540 1172 msedge.exe 83 PID 1172 wrote to memory of 540 1172 msedge.exe 83 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 2416 1172 msedge.exe 85 PID 1172 wrote to memory of 3352 1172 msedge.exe 86 PID 1172 wrote to memory of 3352 1172 msedge.exe 86 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87 PID 1172 wrote to memory of 4512 1172 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\vpnclient2\复件 (2) top.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ae6546f8,0x7ff8ae654708,0x7ff8ae6547182⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,6883188191432416068,5584773442551829127,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,6883188191432416068,5584773442551829127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,6883188191432416068,5584773442551829127,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6883188191432416068,5584773442551829127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6883188191432416068,5584773442551829127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,6883188191432416068,5584773442551829127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,6883188191432416068,5584773442551829127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6883188191432416068,5584773442551829127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6883188191432416068,5584773442551829127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6883188191432416068,5584773442551829127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2036 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,6883188191432416068,5584773442551829127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,6883188191432416068,5584773442551829127,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
5KB
MD54d73e65d9f2811c8a8ffc6c7ee93c1d2
SHA1e669d0b2d4a626ee949c73c1406a4dbd23d66683
SHA25696856fe5d9c64c19d92e1314d2de29fbb3812f0295dc072d294c64a32ff93262
SHA512ea6daec3ea3f41f95f5adf25130819aa0f7b563b90699ab3cca441b8a60e658aee49cf9403bf1ce67c6f503f19825a6abc5d6ecfd687275399defd6205a7e4db
-
Filesize
6KB
MD513e4a55b585b0170ee7fc58419d3c79c
SHA1a137c1594f8c13dcf73b4266c60565fcd845b817
SHA25624e312aece8991c505f787d131ffa73500c3631140332535fa8d464460bcd279
SHA512cd29f04c8f0dcf2a3ba8a640b3ba6b0a3c507c0763d22b91fcabf2e31603570d5281435255dce8575307aa9bb95ad56c9bb2aeaeb05e71947f31ee92dc4dc0ce
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53a97b906fedd8e2b5d3898110e6914ad
SHA166eff3829d97acc5b3ad1fd13012fb0a7f0c08ef
SHA256217eaa96999368397c0d7142d7974e8e819711bc6df823955b3464b9f24314f1
SHA51275c3b25ad2dfdb247bc776dade6f8aba713c4984b7f408f18f57a770c2b3639b2743ce6b496b5efc8da8c77be0882baf65c186dd8ed7c2fc87af07bf16740412