Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
4316d74a36022ca3456bb30684b75b69_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4316d74a36022ca3456bb30684b75b69_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4316d74a36022ca3456bb30684b75b69_JaffaCakes118.html
-
Size
81KB
-
MD5
4316d74a36022ca3456bb30684b75b69
-
SHA1
a21cf05672b898ec53d5da6031d81df78fe999b9
-
SHA256
ba4ea8ccbf28082bfc06816d8a7b2af79f4f2344171e77f54310a940aec8d7fa
-
SHA512
cd387103c781cdfe53de15fcfcaf39c27a232ef5d17375b640fbdf9363fdcc8c5c97b88f3eb2e6321d07ce19e23b5aa71fdd4016793de10f5da8d94a9e354641
-
SSDEEP
768:YlkSgOriWNQuavoBgGLE9t/OmH0D3zZ5czUWjkuW23RDnv4CQYsPo8vvMNmY/h2G:DaFE9VOmHlHplv18vvYmY/3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 440 msedge.exe 440 msedge.exe 1848 msedge.exe 1848 msedge.exe 2980 identity_helper.exe 2980 identity_helper.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1852 1848 msedge.exe 83 PID 1848 wrote to memory of 1852 1848 msedge.exe 83 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 5060 1848 msedge.exe 84 PID 1848 wrote to memory of 440 1848 msedge.exe 85 PID 1848 wrote to memory of 440 1848 msedge.exe 85 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86 PID 1848 wrote to memory of 4748 1848 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4316d74a36022ca3456bb30684b75b69_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe8ad46f8,0x7fffe8ad4708,0x7fffe8ad47182⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,18400499428047488331,13944988301393153564,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,18400499428047488331,13944988301393153564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,18400499428047488331,13944988301393153564,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18400499428047488331,13944988301393153564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18400499428047488331,13944988301393153564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18400499428047488331,13944988301393153564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18400499428047488331,13944988301393153564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,18400499428047488331,13944988301393153564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4012 /prefetch:82⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,18400499428047488331,13944988301393153564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18400499428047488331,13944988301393153564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18400499428047488331,13944988301393153564,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18400499428047488331,13944988301393153564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,18400499428047488331,13944988301393153564,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,18400499428047488331,13944988301393153564,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
64KB
MD563e5a0b45632b3dde3694ffcaf0e3f7a
SHA1923736d0cdc308331d5cfaa0ea159bfedc83d53f
SHA256889109910477919b3457416e7764bcd0add19fd959848253026125c7c35c43db
SHA5125b886c4b5122d61f0209ede748aa84445c9388cf38813316c41b3dbd2308216e88394d9a45cfc27113c0cf3bc93b9c37d808f6d3c67888244c176ee095d42259
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5ba4829041c4fc1f4b7c211db2ac53697
SHA1e3b650718eb4a6b70ab5626e83def2cf98e428a7
SHA25635864659525584e71616d37574b364ac13c64c719f85867c000b2bc7f6422e17
SHA512680192085ab6676afc4a70295ed6c908c9cb3a98a8be23b0e593c00788eeb2a874f84a57d445a7d1499ef95ea36b41c07115daa15296cae4ebf15f2b588efb00
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD53426e4c1018d813fe769d6dad1dab125
SHA1bc22c10fb2924d3c1296fec7cbac0a5a8af5ca8a
SHA256a1c6628f155fd269fac11b543d7edda17b3727c37cace3f215f9331377696ed9
SHA51219911f2823c3ad88e65e85ce01926100c7aa1a49d3682481ca822cae119c984ce5ba0ff7c224681722adc757b194b0985bac4df744b58a5a5ec351d8df72a4f4
-
Filesize
1KB
MD5e898836cae4ea0de5cb7f46116c98ded
SHA10607769617b70a09eca16cb511b0d5674dfa6035
SHA256a9bf3f54377c39314b8a5be96f95cee57488d3da38255984ab9534671f4ec079
SHA512bab6fca23417d9fa639a05b91ed21ff1f5bd50ff5cc0dbcabd463393cb9a87ab6e34d08cb2901414400d2f2b79bc5491d0ccd60bf8e6dee6b3f38df79877abd6
-
Filesize
6KB
MD516b4dc87873b84c8390dc7125bc4909d
SHA17e45e838ac69d8b6bdc5ba76e2ac13c479985178
SHA256313c6083e9b429f4daf4406d33f20278a62651c4ccc1e119a9844a9e49ff6e8e
SHA51253209e0b6a65c835a5f5fb6285c877ec05e1aee99e63fcc9b025c826c0d19e8c391e607be2ec14756bad2d6966bbb70c4dc2ea3383f68641e5a074a5c9d3dd9a
-
Filesize
5KB
MD56e2d519799c52ce301298e575782dc43
SHA1c00a45272cbde425d8c585e1e360420ac047b968
SHA256739b2752f3e249e480a6516cb377b2c6f78c1d55a206f1b1dce3fd36865d40f1
SHA51209814c169e2cddbe9cdd4734b33f0b7cc5c246f950fc84f5303bb4b246857f398205c62e88ed8328376accec1edecb707e0cca2a1bbfaf48483171f1b7ade0ce
-
Filesize
7KB
MD534a5f800edfc3036b311d430b59133c7
SHA151786fdf617ff3b5ced5c1440a73d571cd5c98ad
SHA256d2e5f542ca85599cc3345d1a96044e3830d144f4c2b23253b01814d69ae6ef3a
SHA51264a00a656dca2c230958a3eb6eda10ae04b9a214cb496eaf31fd4f03b8da0005d1995ac064bb237f7397b32723ad24fc8848c66f53ce9bc8c19594ca689df478
-
Filesize
7KB
MD5317a028366b4e1166306108f0daadb98
SHA1ba842ff5f796602e301f2a05b16f0e7623b92817
SHA256b299e653841d0fd30afa3e1d953fc51a879f9ef74da83c439d647092e4fb83a4
SHA51219fc5cb55552757cabefe46059d3fb1298ee94109262463ebef70347572881b3c56a29d58c7f04ba98d412c0e7120c8c988c7d00cf9a71802fb26d4e13432bbc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52b7198519b6a2c560e5379f14e415253
SHA19b26cf02f08025d99b65e2019aade3734ce06222
SHA256a7ad7f371f47401661eae5be0bf155323f101290f5b4f0efaec737df9b71d8f6
SHA5124515580c78233c5a54aae0ccb48ea85847820bcdca2a65ba1dab86d1dbaa21542a0e71a0617301f0b36052bb39ad141bc39be67399e5c80e0ba2a204d545a4c3