Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
74f592e13fbac86451608391fcec72e4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
74f592e13fbac86451608391fcec72e4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
74f592e13fbac86451608391fcec72e4_JaffaCakes118.html
-
Size
175KB
-
MD5
74f592e13fbac86451608391fcec72e4
-
SHA1
1df5600eb1087f5ae678667b32392581ea1f7c5d
-
SHA256
7a1f4eff9e4951d099cde601f249a3e67af71817e72c09937e867e41be8d76f5
-
SHA512
5b7bb9a9d8969f7f7b5a42526f934932434142fefdf669d5f1491332f41ae8659a0afcef9c250b7c2b7b947577e5c2b53adae0697c6375b1e256170f4a1f1e33
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3XGNkFgYfBCJiZS+aeTH+WK/Lf1/hpnVSV:SHCT3X/FVBCJi9B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 2320 msedge.exe 2320 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2136 2320 msedge.exe 82 PID 2320 wrote to memory of 2136 2320 msedge.exe 82 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 392 2320 msedge.exe 86 PID 2320 wrote to memory of 3964 2320 msedge.exe 87 PID 2320 wrote to memory of 3964 2320 msedge.exe 87 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88 PID 2320 wrote to memory of 1172 2320 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\74f592e13fbac86451608391fcec72e4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcca3d46f8,0x7ffcca3d4708,0x7ffcca3d47182⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,14274127512281282480,11765538313083068191,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,14274127512281282480,11765538313083068191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,14274127512281282480,11765538313083068191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14274127512281282480,11765538313083068191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14274127512281282480,11765538313083068191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14274127512281282480,11765538313083068191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14274127512281282480,11765538313083068191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14274127512281282480,11765538313083068191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14274127512281282480,11765538313083068191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14274127512281282480,11765538313083068191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14274127512281282480,11765538313083068191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2332 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,14274127512281282480,11765538313083068191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,14274127512281282480,11765538313083068191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14274127512281282480,11765538313083068191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:5284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14274127512281282480,11765538313083068191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,14274127512281282480,11765538313083068191,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1376 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5b4a2f2d9843a3b76c4338a512ff16aca
SHA19d2020cbdc115064cee7e0f85b9f0bc06ab23250
SHA256bed5b275350851b1dfafd534c40204e94ac92db54b8051e6c80ce3c1b44d5f6c
SHA5125e495b01b9326bf9c0559b5c9e3e7fd1bbe2075a997bcab69e0c3564a2f3f242a0e4dc288d548b8a9d0d2cdf42bfcf754a8730f22551f51931968c039503add2
-
Filesize
2KB
MD5197eb36d29e03022fbf6372d01da8695
SHA13c742b39660d45438bdc39ef50f979d005b7e226
SHA25610aead7ab467739163d92edb3ec93fe0ad67e21dc9c5b17dece2917bf6a4d773
SHA512a493f7bd18524f6a742da734c6d042ac870184da71fd75b7c793d926ed2a916054f7276e54af68ced6f279df1be8a0a87916229da6ddd10b03ac59f3cd3dd6f0
-
Filesize
2KB
MD5d6c512bd9745319faa55b44d6b5e4edb
SHA169560f88261aa9707add0d74576033a5de3752e0
SHA256e5e3489f9fe34be7893065349b309a1662988422ec38757edbb0e3762b0fab4c
SHA512652cc781b99118cc4fc9fdd05decc267b4de66150fe2b4c26c62ec3d35e4091a0fae6e5ed1ce8f37989732952c4d604455c9c70cb6ddfe5f74f78b8864911b08
-
Filesize
5KB
MD5f8a04344b8e80f4c2164e9ccb5227111
SHA15dfb447d0fb22c08f2a295179d23fc0df46fd0e1
SHA256b4428a87a2fb2b193ece9a5f4a39dec77d80a7bc255d7bb05a3fdb755171942f
SHA512325fd812395b09c8c0508db5bb5360a2a9d5b614b67f19baeb5fbf0eebf52889a3c13e945658b47fff3daa90c75c1188ba9c4938a1718ec985bae128b95ca5f8
-
Filesize
7KB
MD5ec77264686c857a9849a56d1121d6a93
SHA10d5f0628915aa0f31070735136ce7dae9c91c272
SHA256c32a39999fcdc4a4e36d7610aeff8ee120a0f8dfa2195ef74e1bc60e5a647760
SHA512304d0e1865bdbf58858b6888316194062bd5dc7c26923774918ae124fdeae5649d8cb88f56da2a7e2f11fb36097f04e0aefe277d419715200b7dd58bfc7e8c0b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5d717e2ed7c0d8f52a2168cc6e1a8869b
SHA13d3ee1135da70f4d66d4be6b74148f1fef312e0a
SHA256abb83b4259d3522505b74106c5a11dca06c2da77ca1fe0c7d6cc54a8e44b7d7c
SHA512a6a198bcdfeec9b6527d1ed954b84cf5ef851fec318f2346d4dc4164e42cc5116a19bd8c360a7ca1cef1ca8a77d6d0eccec227a2e7347a344b121d51a652bf28