Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 13:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://za.zalo.me/v3/verifyv2/pc?token=1afyjjfpL0XY2F3BtHzNRs4A-hhQ5q5sPXtbk3O&continue=dengetemizlik%E3%80%82com/pl/mkj/YW5kcmVhLmJvc2hldmFAc29maW5hZ3JvdXAuY29t$
Resource
win10v2004-20240426-en
General
-
Target
https://za.zalo.me/v3/verifyv2/pc?token=1afyjjfpL0XY2F3BtHzNRs4A-hhQ5q5sPXtbk3O&continue=dengetemizlik%E3%80%82com/pl/mkj/YW5kcmVhLmJvc2hldmFAc29maW5hZ3JvdXAuY29t$
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2332 msedge.exe 2332 msedge.exe 3040 msedge.exe 3040 msedge.exe 2480 identity_helper.exe 2480 identity_helper.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3040 wrote to memory of 864 3040 msedge.exe 86 PID 3040 wrote to memory of 864 3040 msedge.exe 86 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 684 3040 msedge.exe 87 PID 3040 wrote to memory of 2332 3040 msedge.exe 88 PID 3040 wrote to memory of 2332 3040 msedge.exe 88 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89 PID 3040 wrote to memory of 3840 3040 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://za.zalo.me/v3/verifyv2/pc?token=1afyjjfpL0XY2F3BtHzNRs4A-hhQ5q5sPXtbk3O&continue=dengetemizlik%E3%80%82com/pl/mkj/YW5kcmVhLmJvc2hldmFAc29maW5hZ3JvdXAuY29t$1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa445a46f8,0x7ffa445a4708,0x7ffa445a47182⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1701480822614664085,4458596537052922355,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,1701480822614664085,4458596537052922355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2516 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,1701480822614664085,4458596537052922355,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1701480822614664085,4458596537052922355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1701480822614664085,4458596537052922355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1701480822614664085,4458596537052922355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1701480822614664085,4458596537052922355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1701480822614664085,4458596537052922355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1701480822614664085,4458596537052922355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1701480822614664085,4458596537052922355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1701480822614664085,4458596537052922355,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1701480822614664085,4458596537052922355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1701480822614664085,4458596537052922355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1701480822614664085,4458596537052922355,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1701480822614664085,4458596537052922355,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1701480822614664085,4458596537052922355,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD580aa556cb0753425fbd38bb347f7ae15
SHA1d1a24e0c9ec2beae02f4fb462384c057ec3e485a
SHA2567e8e22dbf3969806d4968497386deb117a144c0fef0b3210ca730806ac477c46
SHA5125a051c7bdb62602a5027adea4183be6bcd87f0aae3bf6efadd1d501259be0f3a7ee66ba486e2c16b8cbfffe468737eb05fa638cd877dcc7ac1ec87f87dae3084
-
Filesize
1KB
MD5fbdf7544edce3451a7aea3c9ddeb68c2
SHA167bcc181628bf2a134ff74c9c6682470c60b5074
SHA256388f9ef903426a40e3a2b3d58599afa4fbcedebd32c7631ae339defd18b6342c
SHA5120064f7387af945d7ade7d41a30f301f4e63f677966b7b268e20b1271b9d0fba02622c200f94099a1b89e5a75b477857b6174dae34bb2afc39ab4356e1caf3755
-
Filesize
6KB
MD5c5767b03334ba6683fb288e290eeb417
SHA1402ff7d79bf7322fa764c01dd2a74fbc68f5ce5e
SHA2566fe6b4099cd8f78a11fb7df414e588571adf28709cae18ed425602be0d5ee623
SHA5124cc2248054173f3c67c466f47d99b31747f838f7edc535026b7e1aa67fec5fd289d7bb32702ba4a26c474be077d1ff97f3ef90564477058af8a7dba7fd97a258
-
Filesize
371B
MD5c92505ed5d19eac11ed3e839310d8bd8
SHA18006ca5b5a31dfd86cae6c8281497a2632591a41
SHA2565db1d41a4da11c7924280a8df301199c0c12f98dc14c1acdf926cefae50d53c2
SHA5122896b272f37b1cc07e98b7dc5fc544e8be8d548e4a7bc317280fc1f1dae6a4614686361c000d50560481459b0ecd8134ace02fd5ed7faee81365e7720fa30db2
-
Filesize
371B
MD5e28470079c1feab54f4c4b2930f51694
SHA1d9dc856a5c0d6020f9bbbbd430184cdc10680477
SHA256c31831241c2cc7fc95b74b8a75fc0e9e6f2f1279bc67bb910ff7c2e146a227f0
SHA512fe03055cab8aa1510b4a26b6ee47f4799f449e73bc2bce80d301731bfd06f6bb4ea3f3e0ab50b7071cc4a365403ce7fa3154de4485aa5eae7e718dc6c9e6c960
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b6ad78d0-8530-4fd2-8f11-d821063b82a7.tmp
Filesize6KB
MD5362e19f2aa10cb42612d9650e56826df
SHA1b4e19ebc0db24ff8abbf4b35edf6a461e2c6be7e
SHA256b6c9bb13f7976d6ac7f332a41d9c980d758dd1f6c19f47d33f2bf3155ca79c2b
SHA5121b41b0a5f29a5cb411f23d8a5a9ffaaade810b692b688a145cc4f48e501345b4add2b88c33197ee3eed4c2d24b64f41b46aa13f457445f929430f6399da5f8d8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5674d9f3780facd992d29866fff74a8fa
SHA12bb7b5a862bc49dc0afb7920edad0b99d15241f7
SHA256bfafd6bab52db24d1e4ca31dbfaca915cd40c884935a0f0c295d15151cadba76
SHA51293443f7e7a062b45d59073ba52d685d53a77556e11c4bb256e78cbdfa474330e097c499c9637634514a7e47a3eadd3dbda88423d933c82fcdab8243470c62749