Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
f65019ac8c43e067836387717c5909ba_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f65019ac8c43e067836387717c5909ba_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f65019ac8c43e067836387717c5909ba_JaffaCakes118.html
-
Size
432B
-
MD5
f65019ac8c43e067836387717c5909ba
-
SHA1
e55f57ed70a5e83c5fb3aec871f3b33f97e6188b
-
SHA256
a2797d19be599dde9f5d2edd9072daf7914dd57d7ede1a35dedcf30de256e59c
-
SHA512
24ed425701070e8180be0d8bca0e88d09bd92345cd3f7874d176c07d7385eaa8b4cde875f07280f4c772871203031e412db5775df081410c5c48fd4f077cd1ca
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3076 msedge.exe 3076 msedge.exe 1728 msedge.exe 1728 msedge.exe 4744 identity_helper.exe 4744 identity_helper.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe 1300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 4868 1728 msedge.exe 86 PID 1728 wrote to memory of 4868 1728 msedge.exe 86 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 5064 1728 msedge.exe 87 PID 1728 wrote to memory of 3076 1728 msedge.exe 88 PID 1728 wrote to memory of 3076 1728 msedge.exe 88 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89 PID 1728 wrote to memory of 1076 1728 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f65019ac8c43e067836387717c5909ba_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd034846f8,0x7ffd03484708,0x7ffd034847182⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,2541964134356992534,1313537180012952645,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,2541964134356992534,1313537180012952645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,2541964134356992534,1313537180012952645,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2541964134356992534,1313537180012952645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2541964134356992534,1313537180012952645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2541964134356992534,1313537180012952645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2541964134356992534,1313537180012952645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3832 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2541964134356992534,1313537180012952645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,2541964134356992534,1313537180012952645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,2541964134356992534,1313537180012952645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2541964134356992534,1313537180012952645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2541964134356992534,1313537180012952645,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2541964134356992534,1313537180012952645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2541964134356992534,1313537180012952645,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2541964134356992534,1313537180012952645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,2541964134356992534,1313537180012952645,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
6KB
MD58e165eae855fe088320e88d545e70ac9
SHA1ddea8f40b5577d7c0fec8def81ad6e48f4c677eb
SHA256dbfa367210150b27e764e22155f3cc0102d5f39a1c663252a694a5ed527a8822
SHA51291ecb04bc414d531e463e8705198d0763e3b997456256fabd644e46ab9391160e16cb69059a64dd7dde2a60725de73176aa176277b3a78f197790c2bd3783a96
-
Filesize
7KB
MD5ccb8d35b6ae32ef3dbc88f54693afeaa
SHA1910dedcd7c5e6b899c99f8d7a8ee9ae393dc3926
SHA25657fd53e21e53650971cbd76210144e5b11596841bfe86ea73addd36d35882462
SHA5123ca3910ddad62fa3b8ed42404d8819debfd9159ed08a6fa4d1b3077e0a40dccb535c0ae460326d71c749bf5ac8f9cf39a2134883aae928994956024af3f81609
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD590565936f1104bdced15d1b21f927d56
SHA1bddcd934f29b8c951978eafdcb0a1d660ebf5d90
SHA256933c076def4ad97c7dfaa4272a5063b5a784988eded701db52a0b827903b4c15
SHA512db585c5b83501ca48f7cd6ce2a289499ea2ddbe33abc4947a9bc9c35e89c39abba36df6919e0442140382e36ad12136d2696ceac76bae5b56a729b697d82cd00
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe578472.TMP
Filesize48B
MD5f6a072807204b1d924445294c7b2f47c
SHA120b8f128eee215b04901a0c98c714dfe46c7d559
SHA2560b5c24d48a92a4b593940f90d0095a5a194c695befc7e8c955df0840f33d7240
SHA5126d8e07be22cb28b71bad2b208d36e3fadbfce436bcdec08c6262d23382c978390270ae1bf6a3efdf5dc89036638b05665d8a2e4b142c158d1f22cd64e0afb694
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e17969655889b899a868a57f6fbd3749
SHA1a4fe7e349d5a295740874d9e4882412b8766069f
SHA25694b64e76168dfd0364c0fe467f274b8aa174a6c1067f1f63d2c4dd4ddf3b3583
SHA512f445ade2c0c787aab04ce441e8ed197162e0c2689dceb4b5b0941e4e4bf08297d5e57a75eeb864312be505dbc010db306025fcb244188fa76069eff4db05aa5f
-
Filesize
11KB
MD5c87e0447fda2416080b32d8a26327b37
SHA18b243e9ffe3daacd6c67b1162e887e340473c1da
SHA25639fff0bc64736d5ec71b422b10d55e9712c1b4529fb226756388fcedd9e37882
SHA512b3cac09d6c73cfe798bc3e840369069163f4364d3451d886b56db65115873ae741626f4193a056f033e8839974ef1a98847fb2c45143899b0297fe068f1d64ee