Overview
overview
1Static
static
1admin/index.html
windows7-x64
1admin/index.html
windows10-2004-x64
1admin/新�...��.url
windows7-x64
1admin/新�...��.url
windows10-2004-x64
1editor/exa...1.html
windows7-x64
1editor/exa...1.html
windows10-2004-x64
1editor/exa...2.html
windows7-x64
1editor/exa...2.html
windows10-2004-x64
1editor/exa...3.html
windows7-x64
1editor/exa...3.html
windows10-2004-x64
1editor/exa...4.html
windows7-x64
1editor/exa...4.html
windows10-2004-x64
1editor/exa...5.html
windows7-x64
1editor/exa...5.html
windows10-2004-x64
1editor/exa...6.html
windows7-x64
1editor/exa...6.html
windows10-2004-x64
1editor/exa...7.html
windows7-x64
1editor/exa...7.html
windows10-2004-x64
1editor/exa...8.html
windows7-x64
1editor/exa...8.html
windows10-2004-x64
1editor/exa...9.html
windows7-x64
1editor/exa...9.html
windows10-2004-x64
1editor/exa...0.html
windows7-x64
1editor/exa...0.html
windows10-2004-x64
1editor/exa...1.html
windows7-x64
1editor/exa...1.html
windows10-2004-x64
1editor/exa...2.html
windows7-x64
1editor/exa...2.html
windows10-2004-x64
1editor/exa...3.html
windows7-x64
1editor/exa...3.html
windows10-2004-x64
1editor/exa...4.html
windows7-x64
1editor/exa...4.html
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
admin/index.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
admin/index.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
admin/新云软件.url
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
admin/新云软件.url
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
editor/examples/demo-01.html
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
editor/examples/demo-01.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
editor/examples/demo-02.html
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
editor/examples/demo-02.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
editor/examples/demo-03.html
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
editor/examples/demo-03.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
editor/examples/demo-04.html
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
editor/examples/demo-04.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
editor/examples/demo-05.html
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
editor/examples/demo-05.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
editor/examples/demo-06.html
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
editor/examples/demo-06.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
editor/examples/demo-07.html
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
editor/examples/demo-07.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
editor/examples/demo-08.html
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
editor/examples/demo-08.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
editor/examples/demo-09.html
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
editor/examples/demo-09.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
editor/examples/demo-10.html
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
editor/examples/demo-10.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
editor/examples/demo-11.html
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
editor/examples/demo-11.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral27
Sample
editor/examples/demo-12.html
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
editor/examples/demo-12.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
editor/examples/demo-13.html
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
editor/examples/demo-13.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
editor/examples/demo-14.html
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
editor/examples/demo-14.html
Resource
win10v2004-20240704-en
General
-
Target
editor/examples/demo-03.html
-
Size
740B
-
MD5
94f91a3acce9f8482f8e34b64bf20cc1
-
SHA1
09ab9be5b66e3143a783b0c0db1e8e5c394faffc
-
SHA256
430fc56a9de3e5ef7659b72a5428b9caedd23d771d31f525ede64ca5ddfa3074
-
SHA512
2fcd4c784783f9f28f365657c5277af59dba519a215b7d41c5744df18c2f65bbf03289dc2ebb8d6f84d9afe096ac1f3b40ec838a9b97d302d9394c522d15f8d8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1932 msedge.exe 1932 msedge.exe 4536 msedge.exe 4536 msedge.exe 3468 identity_helper.exe 3468 identity_helper.exe 2404 msedge.exe 2404 msedge.exe 2404 msedge.exe 2404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4536 wrote to memory of 3932 4536 msedge.exe 83 PID 4536 wrote to memory of 3932 4536 msedge.exe 83 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 3512 4536 msedge.exe 84 PID 4536 wrote to memory of 1932 4536 msedge.exe 85 PID 4536 wrote to memory of 1932 4536 msedge.exe 85 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86 PID 4536 wrote to memory of 2880 4536 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\editor\examples\demo-03.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc14446f8,0x7fffc1444708,0x7fffc14447182⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,11755006612246241676,4836365143254537968,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,11755006612246241676,4836365143254537968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2536 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,11755006612246241676,4836365143254537968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11755006612246241676,4836365143254537968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11755006612246241676,4836365143254537968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,11755006612246241676,4836365143254537968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,11755006612246241676,4836365143254537968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11755006612246241676,4836365143254537968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11755006612246241676,4836365143254537968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11755006612246241676,4836365143254537968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11755006612246241676,4836365143254537968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,11755006612246241676,4836365143254537968,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fbc957a83b42f65c351e04ce810c1c11
SHA178dcdf88beec5a9c112c145f239aefb1203d55ad
SHA2567bb59b74f42792a15762a77ca69f52bf5cc4506261a67f78cd673a2d398e6128
SHA512efad54eb0bd521c30bc4a96b9d4cb474c4ca42b4c108e08983a60c880817f61bc19d97538cc09a54b2db95ab9c8996f790672e19fb3851a5d93f174acdfac0ce
-
Filesize
152B
MD55b6ff6669a863812dff3a9e76cb311e4
SHA1355f7587ad1759634a95ae191b48b8dbaa2f1631
SHA256c7fb7eea8bea4488bd4605df51aa560c0e1b11660e9228863eb4ad1be0a07906
SHA512d153b1412fadda28c0582984e135b819ba330e01d3299bb4887062ffd6d3303da4f2c4b64a3de277773f4756da361e7bc5885c226ae2a5cfdd16ee60512e2e5e
-
Filesize
6KB
MD5bb67bdcd856b70338fa7e12cafea584a
SHA1596fde357ff237b4f2576bb33cf9ed67605e5d57
SHA25652cd92fab7efc651dc6d30907db5f9dafda0da9588eadfe41642ece2e3ee40e9
SHA512cb5fd0bef8711f5823bc03b00b26b8c91743182054d80f700f9116d65d29137d2522424c7d4c7f801b3d3e8f41b82c3007f8035ac372e80113bb7b389b79aa97
-
Filesize
6KB
MD5fb8289d491c71f476a5d794cdcfa173f
SHA12215a03220daf9953c8c1e58a61d427d9e23777a
SHA256f954d6dafbcae98966d9daeea2e11ed7b8bdb78a34af329d4e074436dff92502
SHA512e072c5a4538cdadd59a5b1fb62fa67bf63979f6e656950940cc47dfcf92ec39e147621668966fc240712e4f745f780ea4508b1a6f5ff85658bf47a5fdf7b14f8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD544983299ddc90f3d04eb185a66b41e97
SHA1c690f08567230825081b6dc4d4d8f61d63eba011
SHA256c6b7acf235765b974e037d41490e5a8bc5e5d72f36e184c85718d120c3ee816a
SHA512dd91160240dc9dc94457776afb2a17930c02f9369f93094a5a6fea2d9c17574534f20c3dd1536e2d25389ed4cd162a7df5ce9a6124ce4c5d10dda9c5a2078de3