Resubmissions
04-12-2024 20:49
241204-zl8dwszrc1 304-12-2024 20:47
241204-zk7qzazqh1 304-12-2024 20:47
241204-zkt5wawmhk 504-12-2024 20:45
241204-zj17sswmdm 504-12-2024 20:44
241204-zjk6kszqbt 304-12-2024 20:42
241204-zhdecazpfs 304-12-2024 20:42
241204-zg22bazpet 704-12-2024 20:41
241204-zgm76azpds 304-12-2024 20:35
241204-zc576swjgk 704-12-2024 20:32
241204-zbbl6szlgv 3Analysis
-
max time kernel
69s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
Payslip_Amendment12009.htm
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Payslip_Amendment12009.htm
Resource
win10v2004-20241007-en
General
-
Target
Payslip_Amendment12009.htm
-
Size
5KB
-
MD5
931df36f406e0f5495c5d77fa91bf035
-
SHA1
01bbb0abb4f14451a48800e47d203732bc139920
-
SHA256
09dd2d9fe7934ea2d88ab8a7d13a824bb462e73d9d2d982e26d8f9a35646e5d5
-
SHA512
df882dd9eb3f6ed9290cb5b764653afdb3833bac947e6b18124454394380b1fc7cf6a7c5b7001108266aeb50813f6b5905e6bf94507f3116e76e66049bba1351
-
SSDEEP
96:ekUhhhIFDkrQJoSheziDftDIhfBDIEDHhDhiDgBhDMDftDIsjNhFiDIEDIfDhyDl:6hhhIFDkrQJoSheziDftDIhfBDIEDHhD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2756 msedge.exe 2756 msedge.exe 684 msedge.exe 684 msedge.exe 1864 identity_helper.exe 1864 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe 2756 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2756 wrote to memory of 4468 2756 msedge.exe 83 PID 2756 wrote to memory of 4468 2756 msedge.exe 83 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 2220 2756 msedge.exe 84 PID 2756 wrote to memory of 684 2756 msedge.exe 85 PID 2756 wrote to memory of 684 2756 msedge.exe 85 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86 PID 2756 wrote to memory of 3964 2756 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\Payslip_Amendment12009.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac05146f8,0x7ffac0514708,0x7ffac05147182⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2556 /prefetch:82⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2888 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2900 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2037210022243565119,3127305066829997690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:1928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5eb3d7a6201147d3d1d797b71c1100f9a
SHA123df647b9ac57286754e53f0a3fc9272aa5bc2f7
SHA2568d3bfc41bdea46c86eb9b419e2414878e9060c320b3dff2fc9d8093167feeeaa
SHA5123e4a5aff45e06c2cefa4180e171e6343b615239626ffaf2204950b3e031355197879af52d50b90762aa67431154de87ce1bcee8191a7710ee9148657c35073f0
-
Filesize
6KB
MD5a0a4ee7c18aaecb1fc648885c627120f
SHA1b00e5eb3c7bd0e75a91cb8d2a5abafff246efcc8
SHA256e562603b0333b655d1173524503a5e3b0464cc5a12b5b4e4540b570ff7a04cfa
SHA51223285ea569c7e7c0e0bfb7907ac3a014b99300bd7e03f967ed38b48739dd34b7e27586b46e7fd6f3081b37f1f14bb59c069b440dbe1902397cc76a8c5107c57b
-
Filesize
5KB
MD5fb299b045507b506c40a7062b640f9fb
SHA15b4627caed5fb962c5f9d6c55e5cd5bc392b7f1d
SHA256ed14d8ff8970d258ae739bda0415c48ca65f946dba5f4de93ac5ef37d1dfc36a
SHA512b5cdd6289076111e14d23eaeddbd1839d909fb1d962e423eebcb0a48290ff7933af52fd1d6c17f539d06718b38f516fad6b6601c3dcd4795f9fb297417b5c95f
-
Filesize
6KB
MD589303102d6a4512a5e6c78adfbe1a4e3
SHA1acf95c6bff020f217c2c5d195a8c1e3653a148f9
SHA256dcfdfab7d78dfb7f863b751de2a573f61ef367e5607bbf8a357a061d8e88a708
SHA5122a532d5d7a253e73f9862ef62eb98cc3bef735789e3cc83dfedc506492f975078039f4d1282f586e1cc524cc3f228ab16646258bf10843004b2e4e9d6ea18667
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54fd12955053782dcd01eb9aac271e75c
SHA1a54848d598f3184cfb9fca06dee1170df2ff4fbb
SHA2560b75ab8c3f90c30230805a60f2ecb3197d64b32ba299764efb8a5d0c77f3501b
SHA51289f17025f513e5a995519d346b02d9844a53d0086d91c6951ac2584a970536eb2913c9e13a207e8c4758aa5f65561a84faa56fab5c4340ab77a6a51a774261a2