Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
259d449206520a4c792aca350410ca3e_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
259d449206520a4c792aca350410ca3e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
259d449206520a4c792aca350410ca3e_JaffaCakes118.html
-
Size
96KB
-
MD5
259d449206520a4c792aca350410ca3e
-
SHA1
541e6c4e619792cc4155a1f58f1b68b1218beebb
-
SHA256
07d3afe0b1b365a41594c80ca1c8c6e86a646a9cecb963e1038f12f4a73c4f5e
-
SHA512
ab3a2c3fa32e005f8be091f8da6868698a1825d7b60ff0f0a13f07125f0ced619aac2b13d3456b0bef12efcdc6b5f688294c64c169f433265cd8a568de6d2f9b
-
SSDEEP
1536:wX4dUN/03pD0ej8mRzydu4h6CPclQ8/+FotPw9j5mKf0wV/u/OqrBHt0VrFJ5OR2:GmURQpD1BgjMvASV6DT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 2856 msedge.exe 2856 msedge.exe 4924 identity_helper.exe 4924 identity_helper.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2748 2856 msedge.exe 83 PID 2856 wrote to memory of 2748 2856 msedge.exe 83 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 1236 2856 msedge.exe 84 PID 2856 wrote to memory of 3224 2856 msedge.exe 85 PID 2856 wrote to memory of 3224 2856 msedge.exe 85 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86 PID 2856 wrote to memory of 4372 2856 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\259d449206520a4c792aca350410ca3e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa9e7046f8,0x7ffa9e704708,0x7ffa9e7047182⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,8173151134191087489,230646915706858149,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,8173151134191087489,230646915706858149,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,8173151134191087489,230646915706858149,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8173151134191087489,230646915706858149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8173151134191087489,230646915706858149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8173151134191087489,230646915706858149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2816 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,8173151134191087489,230646915706858149,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,8173151134191087489,230646915706858149,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8173151134191087489,230646915706858149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8173151134191087489,230646915706858149,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8173151134191087489,230646915706858149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8173151134191087489,230646915706858149,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2816 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,8173151134191087489,230646915706858149,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\443e2f7b-ac0f-4eb5-8671-28653300d0a5.tmp
Filesize540B
MD5e76821860d22fd0c781395e842e9fc89
SHA1eb513e55354084d2810380cd71f46673c0b60971
SHA25662295cfd297700648daaaa13f3df5ae4effc378b2603c1dd2e5cf1551662fe19
SHA5129689e2dc139e66358d0e4d0956cd970c6a0cf87b5de27220f40ed91ac51feebfb7066a197e090f97342d671e6ee00b95b8c2ea9ba6e86930b6bd7468b5b9db01
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5d196ccea1d8f8563e5d81b82563d92a7
SHA1158c348719aad88b4f4a5f93d70a9f4e0d4bc292
SHA2565161b65d7ce21cfa8a50878ff8da02ad49244f67c65ff07d70935983ee38356a
SHA512c1bfc17aba8cdc86f3f6f97c62b42f080578a96407d08335b9ed749803fef05d165a1436c94ec9f45a68b76d9f0f80a39aa0758e2e2ffac1f5e39c77df822564
-
Filesize
1KB
MD5a210bf374cfbdd2ba129f1aa32d0720b
SHA1542dddab23b9db5d0fa42b5f9729963b97d965cc
SHA256dcd510f7da87a0d8e800f51de141966e7f6669291ebf2389137d75135713251b
SHA5125bc6ceb38c717b6ec95e4e2d06476f4e0dd8de67d63105df635d202ea27a77004af011eb2b6f7c761e5e5af4f5f0aa508952cacf5e3d254ca289e4bf663545d3
-
Filesize
1KB
MD5403fc3aae5d7ddfc4f0d248e3aa9d1c1
SHA1a7ec6060a36c59a711db94c048ea71939f8d490a
SHA2564f89e616b4a64f843907c730c1feaa262ef39ecf2a769137a383d7fd1ee0b783
SHA51295966ccb9237e0aa9ef38a8c017c5f2b541eedf46fc6657d5f0870e9b87ebdd97ad9a8a60f36281c28acb43a07c66f25b85fa65a45658d72139a3ff08b5c5eef
-
Filesize
6KB
MD50f181c2e8c4fb07cdc116179e77929e6
SHA1282ec5cde26b72f9f95e05f0eabea3dc9890c9c7
SHA256c016ca96ada86c13e704f017df9803b91834611e3321bb5759911279c1bfb395
SHA512a9b0e2cbf55095cc5ebcda556e2445601aa5333ba6de8604c41995ac9c8899bb87a42fa6f6416031161834b44d53ceb79dbb78ff649d87dc18ec1b4c355a14a1
-
Filesize
6KB
MD5a279f8c2262a59acbe5ed3c6076d71a1
SHA1638b8f9b9e4059f4864d23893e27ff5e99464bc1
SHA256f2090fce8473e97a30e94abd869db6139e0d696b721c26bffcbeb9716f57ae2a
SHA512cdd5312c5947fbcc05173b08c48c3dcd13874dc301eda6c8678d34cf2a71511a9967854cadc31d5595b4cac6b9fe8cd9acbed58390a0690fe50d1f4219f0a707
-
Filesize
6KB
MD58991b2f50dfa4fe3ddd74077773bb25e
SHA1da5a0c68e2e70a4ee99a60d4cf6f60c3b554cdb8
SHA2560f6bf047541df6a092637776ba5963c2fd9b55b1f503046cc818ddf3244cb9d0
SHA512670694a194f0b7cf6349dbadb94adcd0410cb5f6e1c3293883a1144030e9bd63028bb12aeacdda071bb1753283dfcc53271ad9f4613b7b75db7eac10380d3992
-
Filesize
204B
MD5b25407e8e1ba7eab795216bf8ec21bb0
SHA1a2c1ba5e2b83797531441305ea05b0b07cc7c0eb
SHA256a32306c0559258f4a4df553c259ab1d10a0df61a7684ee6d03b38212a1151377
SHA5124da357e75947efdbccb2640f3082bcea2cca1cc36f214ae14c836be8c6adf50e782e4a261cd3a5f57a55925fe8c52b9278c6ea657039581be38bf6e63bdd1375
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5f6e6d248064f1cee43de1d0cc746cd87
SHA18cdc3904a2bbf9a4eddb30bf2810779b8b39d6a5
SHA256aab62c40a55fdd05f2eb6aa561ceebac032c792bde93f9d417ea7b87a56a431d
SHA51215b4142264197344175168fbb7dd6701ffa94ca87f39e49a1127d5c27ed658b76ac83b85b0d735d7b8bcc05bf037103fd4f75abf07ae211c2e04796881c98507