Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
3d7f5823959dccc5ae48cfc6a0dded31_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d7f5823959dccc5ae48cfc6a0dded31_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3d7f5823959dccc5ae48cfc6a0dded31_JaffaCakes118.html
-
Size
53KB
-
MD5
3d7f5823959dccc5ae48cfc6a0dded31
-
SHA1
55206ccbba2790bf9081090eead68e0dcef3a8a3
-
SHA256
dd656bb124a042152cf45ff51cd2165994afd86dfd14ee0df6189acfc6ca5da2
-
SHA512
2a1533cfb2ed859f9533be3e71e03abfc896446a7494c9a747cf60f34b85b6d7db352862027f6b654358d169e9eb9817c3741ed15662f18ea0e847b6e646b4ce
-
SSDEEP
768:41wzi1S5y5v/1b28EFaJUAyDsebtodVhLvNtoG2yPt9:41w+g81/1S/W6lbtodVhRtoG2yPz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 1088 msedge.exe 1088 msedge.exe 4032 identity_helper.exe 4032 identity_helper.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1088 wrote to memory of 3176 1088 msedge.exe 83 PID 1088 wrote to memory of 3176 1088 msedge.exe 83 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 4892 1088 msedge.exe 84 PID 1088 wrote to memory of 3372 1088 msedge.exe 85 PID 1088 wrote to memory of 3372 1088 msedge.exe 85 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86 PID 1088 wrote to memory of 4512 1088 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3d7f5823959dccc5ae48cfc6a0dded31_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff807a246f8,0x7ff807a24708,0x7ff807a247182⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,4195749420989043028,7732893272603309706,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,4195749420989043028,7732893272603309706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,4195749420989043028,7732893272603309706,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4195749420989043028,7732893272603309706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4195749420989043028,7732893272603309706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4195749420989043028,7732893272603309706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4195749420989043028,7732893272603309706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,4195749420989043028,7732893272603309706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6172 /prefetch:82⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,4195749420989043028,7732893272603309706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4195749420989043028,7732893272603309706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4195749420989043028,7732893272603309706,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4195749420989043028,7732893272603309706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1316 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,4195749420989043028,7732893272603309706,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1844 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,4195749420989043028,7732893272603309706,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5a6f34f08ca2b6c71d3d59076b3483b32
SHA17cbb07fd99ff0c9540e8bc45890bd555d7413fac
SHA256e2caa56cfbff9608fab249459076f61d7f932c8409d22fb553688324a137aec4
SHA512405e8252f16eb2dee598ebbd0fb9291606b9b3852c2780adb423853f1bd7b6ae125aa778b8c60583be2dcb880b018208a1850d7ea4317523d23ac13da48c5d8a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
869B
MD567dfbe7924fd61467942d148332ea6fb
SHA13ea55b954bcab0cde2c67a58000caca67051e8f2
SHA2568a54cd545072809db6c4985ec78e7a33ba03a3d9fd4ac28505293c3cde6b898c
SHA512ce3d7d7cec4a6b750f8a7488761028fa6c674ef53d3fba1593523699ae95ce1bc2f4e5eb1974858b8e7fcaca8a82f5a968166eee91254711f76b960bd115f554
-
Filesize
807B
MD5f39d46558125cf554d038506b6d58ee7
SHA1bdc383717afd6ef5eb4602fe98a9dd77468acf6a
SHA25652639f75adb24e6c121d604be64a834f54c513861d4da8c1984cb7c94f3142e5
SHA5122183a760548813911dd82e4fb264df467792da30cf5ed46cb6eb75bee09c6ba5ea2f8655dc1d0ad9064c53aa77d8e698c8562f7b5c1420c4c4b97b41488c8734
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5f8f07e98dba84b2fc24032b20b47f228
SHA13ede601119a1be619c08e3af2bb7d7b1e6cf0bfe
SHA256d158cc771f0e990b45791def8e0885a14b2f9d6c6c9ec1d00bd4a6d292a43e87
SHA512a84da24947b3b145df866c01bad6e746aa63ef8907c72f031c691817bbb602e1e1f22b14b16390e6955578f180ef510e04e90000d935840fe904009b3fd13257
-
Filesize
6KB
MD5a45333b339de6354b45700375f8f142b
SHA1c2a7624cb92634d9c4fe71eba7fdaf02cb299ab6
SHA2561cc3d61454d0b78c6a148aaeaa1f25aad58109b342c4199fcf363ed7823fc588
SHA51222699e43a5d2a7d62784efc6b1d1b961b5a803349d24b4dcf4e31b6fc32f5fd7b4ff079361d5d33671054146824f41c0d5781b7d4f35ce10508d7252686d1732
-
Filesize
6KB
MD5d3a3bb1c08598ab38abc73f390fe9db5
SHA1c3c81b85b2f8764a21a07da21fde1a84071b5029
SHA256f762ce2a757926503f29dc7bc280efbea6e2c433d0dee3da5b2f56c9b9227c4e
SHA5129aeb3635492832ec3973298d8af25070397b1e59130d3805b36a15733e4dca0ff7df3451692d89c4809ab22f49dc715d072476e4c6faae61f16b4f9618c62618
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5565eed50663f5c8343accf55f26985cc
SHA18941723072e6450587795bd6f6870e74a2273f22
SHA256b37dcf6732ef866b5338ae70c05bbba4b253771763ba30f16de9cd86a0784f4b
SHA512dfff6e77af89a8d6b823ef8a21a5ef2ec99bff6bd64f0bede3c877bdf477793e8e7da3d687597e071a58548f4c54fe022504bfc51a85414904a894934bd251b2