Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
e0e7d542d9ccc6348348eb41b8e2adf7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e0e7d542d9ccc6348348eb41b8e2adf7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0e7d542d9ccc6348348eb41b8e2adf7_JaffaCakes118.html
-
Size
29KB
-
MD5
e0e7d542d9ccc6348348eb41b8e2adf7
-
SHA1
f5de26b187f91fe7c51c1e4fd45b37e510badf7d
-
SHA256
5011490e06d5ec8cebdadc0fac27f5b43011ccc930b89af80f16a307d18413d4
-
SHA512
2efe097aee7d5a8b3da40db5682e6ddd9613e45a758e4659b51be8096035aaaf3921bfb21547fcc0d57d5da8d4f35923a4b1d1b9eb06e8d1ce2c5a11b1aeeba5
-
SSDEEP
768:vcIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZwI:0IRIOITIwIgIiKZgNDfIwIGI5IVJ7Sq2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1760 msedge.exe 1760 msedge.exe 4856 msedge.exe 4856 msedge.exe 3472 identity_helper.exe 3472 identity_helper.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4856 wrote to memory of 4992 4856 msedge.exe 83 PID 4856 wrote to memory of 4992 4856 msedge.exe 83 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 4940 4856 msedge.exe 84 PID 4856 wrote to memory of 1760 4856 msedge.exe 85 PID 4856 wrote to memory of 1760 4856 msedge.exe 85 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86 PID 4856 wrote to memory of 3660 4856 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e0e7d542d9ccc6348348eb41b8e2adf7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce49a46f8,0x7ffce49a4708,0x7ffce49a47182⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13678629336594022023,8290436619905473927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,13678629336594022023,8290436619905473927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,13678629336594022023,8290436619905473927,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13678629336594022023,8290436619905473927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13678629336594022023,8290436619905473927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13678629336594022023,8290436619905473927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2104 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13678629336594022023,8290436619905473927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13678629336594022023,8290436619905473927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13678629336594022023,8290436619905473927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13678629336594022023,8290436619905473927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2824 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13678629336594022023,8290436619905473927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13678629336594022023,8290436619905473927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13678629336594022023,8290436619905473927,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4264 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5f95ed5570498a44883848152b501c595
SHA1ec424c6d1c24d571efc1c1f23225f16fffa05ea8
SHA2568db6f1e724b1d00387482da15fafc156328c47173f660c6260946e593073314c
SHA512abb46bb1892144dceca1a56e8b0c8258f25940cf7dee1bf3a7d9a7c3b54e38a381bff94656afd37b03a22e641717b2642e3fbecbbfbe0925b5e1801c8a8cc72f
-
Filesize
2KB
MD5554b2c3b4cf6d0528b50eda159d067b6
SHA1876418889bf347d6e30ff3f211a7bae9b41bd1e7
SHA256c6bfe88c15384e9deccd7e1a6e4623767fdee047b8beeb8b9c0451b8ee386af8
SHA512559347589b07ceb9a93fa1396636d8932d0e710ad2e399d36ee4e9b733475b632c143dcb1967d5ac039584fd1d26b9586a6a259e66f1b433f4cecf5ede0348d0
-
Filesize
2KB
MD5a829765009fd0e7ec3d143f46c6c785d
SHA190f3d047a99f927671c1b77ad32b22d307127f73
SHA2564d502f681b1b25189f67ba3486ab7a6c8ddee45b59243d96c351f87d1121c2ff
SHA512faab4a8978b2b1cc537192a41e413a3be60fdb5da1da9e09659b082a6f0a76648b607666edbc16a53e249712184c71d06116170acdd2ba78f9481eecadd5f262
-
Filesize
6KB
MD533b40283ffea9c49a6ae8906b09e1e70
SHA1d18624897c6638b3c0a6cdefbaaf416c7bc7a020
SHA25646dd416c1f389e8f589b6b3dfee49a70f89548122aa94b8974826b4ae2d2bc1a
SHA512a254ef293d9e8fb7919d6c8fdb1ebafbf1b9c974cb260a3b3bcad688e566fc604ea3e2243bef8c992b97ac92b1fc5060b59f7909cd939be7ef27d63dc0948796
-
Filesize
5KB
MD5fa1dc91841263f6eb2a3c61741b88149
SHA19989b1583077a8bd16e252fc444d4b8899955407
SHA2561582995c19b4975d4f3a6ec32bb82df8cd75b14405a330bfcc4e705420217d67
SHA512117d4ea3038042985724a66cb2633b9b3d14dbd721e3b81203aef2b6f0f0263cee3a3cedc8a7f76d71a032e2f4f8ca2fde69f07499776fc591daf1ae4c3a15be
-
Filesize
7KB
MD582609dbc3b511fb8dc22ffc29f8ae17b
SHA1ea6b1f21b4d855a518056dafd6b03e0ce59821d9
SHA256d497e5b4e9a4614882bbcf20832573a619f7429e239191430da432c99949b5c8
SHA512783d697ebc37721cd21c173343b540dba108b07320f990d340e11b93397ef0ec4e9c30dd18c8db104ac94fbe9e7634ed32288903faadda227d49ea25d1333c96
-
Filesize
371B
MD5fd19cf2f8741ad07e8001761343f1931
SHA166fd313443bcb41454c8d16a8b098c60d0486db8
SHA256c94e2f3baf21687dac05397e317ed6c73eba55b4919e7afdba6a1ff2126bd23a
SHA512410dacde07ac0a5f3bac25e5034245301de55743c693ebaecf355774a80d7eb687888e63956bd3f1056dbbdc85351eae0f566e661eb188ca3423f379a296ddf5
-
Filesize
203B
MD57dfd5d48e3b9f5e233aa43b533663db5
SHA1cd313f680853487986942f01d54f5c5eea589efd
SHA256384bd524189054503a6a9421a2f3a2df6d1b02f99a28b52f9238258935ac4e5e
SHA512e7e4ddc777c945ae8f3a7b03ebbae0d92d81831ec7906ea91fb05235e6ed9806c7243d0b074bcbff75363d12bd31d2048ba2f1a5ec20ae32de6fb3f8f01e0b92
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5b897565de1cdc6c4c94d45b85343cf1f
SHA11aa93ac6191fecdfd0eabb4c013d1fdef781ca19
SHA2564d56af3f1d4fc99d59e56449958b83b6ba2ab95503a209e635f69ecf45cd9082
SHA512989d7f8ee704eaab952d116b6c0c2db907fee171dda1c858f6003ee888caf41bc084effbd071c81a6654db63195bcdf57126c8a2d0d9a990fce22cdaa1ff9975