Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 20:44
Static task
static1
Behavioral task
behavioral1
Sample
64b46c1a1adbce79f813b078817ddb19_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
64b46c1a1adbce79f813b078817ddb19_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
64b46c1a1adbce79f813b078817ddb19_JaffaCakes118.html
-
Size
29KB
-
MD5
64b46c1a1adbce79f813b078817ddb19
-
SHA1
20e4d38ff4467fd08ede4aefdb1c2c1024f44232
-
SHA256
20d61c242b69cf680406a06b569ca423ea180720b7b7e2606e948350e92c655e
-
SHA512
0af9cbe9b609188728e02a5d911ac5ea88a06d18c65e7d0b8bad44d8f8af6abd0d9cc72cb38e335ab10d2c3961ba532e30d59647cc1a308c9b4c8422d1e7108b
-
SSDEEP
768:8Ue4WaAQIfGH8Q2bLvv8KCltPWeIFdUcJqc9Y3Wo:nWaAQIf0CbLvv8KCltPWeIFdUcJqc9gt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2180 msedge.exe 2180 msedge.exe 2124 msedge.exe 2124 msedge.exe 4448 identity_helper.exe 4448 identity_helper.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2124 wrote to memory of 4036 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4036 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 1044 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 2180 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 2180 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe PID 2124 wrote to memory of 4752 2124 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\64b46c1a1adbce79f813b078817ddb19_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5a3e46f8,0x7ffe5a3e4708,0x7ffe5a3e47182⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,14107536645831679222,18269722139317932506,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,14107536645831679222,18269722139317932506,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,14107536645831679222,18269722139317932506,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:82⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14107536645831679222,18269722139317932506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14107536645831679222,18269722139317932506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14107536645831679222,18269722139317932506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14107536645831679222,18269722139317932506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,14107536645831679222,18269722139317932506,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 /prefetch:82⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,14107536645831679222,18269722139317932506,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14107536645831679222,18269722139317932506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14107536645831679222,18269722139317932506,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14107536645831679222,18269722139317932506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,14107536645831679222,18269722139317932506,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,14107536645831679222,18269722139317932506,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5a7e985ae1cf3b1853982b8105a400248
SHA1404f4636c8f210e42c931ac1507065700c5fc87b
SHA2564e255906466e0cd22c0f1bdf93af3ac5888314b71043eb881914fe8dc8fc8f65
SHA512a18e3efd6ec1e8420feabe68f0eeadb41b70474a3b5bcfd371908610bee60ee02f52c2ebb2119250bed5d823e9441158da8a2ab772a5fcb48d0df9a1a8bbdd6f
-
Filesize
2KB
MD51422ec74264a550fb2f19929d8197f3e
SHA11ab359b6f48d85726a4094b0b503ae00bff8e0df
SHA256d19f51ba9460acf6de1d2b994af230c1542f313b3faa87b160ca1a915a9cb458
SHA5126d0f539f0874b7c31380d5f78554a388996e708bb1f30b2a4ad7c1b61e9975f71d075f4c6eaca8465559812716503367531a4f3af85d2cdeabdf7ece17cc4cf2
-
Filesize
7KB
MD5aab8afa79a93de4a0cc666ded6630bf1
SHA1a7f9963e928515149a719fe215d1dc7823111aac
SHA2567a51b44e96eb455c777585e48c47bca7bc271a9f00ace631bdd696e6d0746628
SHA51238bd6e518c35e1a35ef142bd21662d1373c54634c12e8d8465bd9dc186190aad87d2dedb15a4eaa31021d6628f03050a8c915abefac6e49e83ec6b5c9850371c
-
Filesize
6KB
MD5948a282b088d81a7cc384657a532139a
SHA14aebe1d6a682ae1cd77b00b86a6213df1cd220ee
SHA256ba0fe5b0eab010a418c1d8bde031e865c1e9b37f6bc90e42fbcebe048dac5d00
SHA512fe920192133dcf49e1e0f48e7137760077ff9413805b52999645d892fa4209dca15412363bd7b9ea71141640b63aa4dfecc274580b430ca414dbc21e4ba97695
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d4446047-6e44-4446-bce4-d09d8a038736.tmp
Filesize2KB
MD5dc21f8f7afa874d72cfd21b553cc9a04
SHA1111dbc56092fe8264a95d95816cc34b282bdeec8
SHA256fb46198d101bc783edb566aa82b03358849d2e94e1f8085b322f99230246a5c2
SHA5126d7489208977566c71bdff960965d35f9f3de684ce3883c519302e5e49b400b9fdaf8f124e38cfbe43e8054f95daa212a13f3c39296290609dbed9d73b6b8df7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD518540cb10bd43bd73fdfeecc5d1d5739
SHA14b7b1fc25f77bc736b6198aa07ae9d2f30b623a3
SHA256129f84a376d919c63dac9fbe2c7d3cf142208e427d37af1aa2fe7e9b25aa5008
SHA512e1a15526e77955c87b16162d98356101dbdb9f05519c3d2316ea6b8193607ebf70d787f2537da82c3302c383439be438c99d961e2b7e73d78cdf6208bc460d3c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e