Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 08:37
Static task
static1
Behavioral task
behavioral1
Sample
c2a387e0a3d12bc03d8e41ca5460ad01_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c2a387e0a3d12bc03d8e41ca5460ad01_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c2a387e0a3d12bc03d8e41ca5460ad01_JaffaCakes118.html
-
Size
12KB
-
MD5
c2a387e0a3d12bc03d8e41ca5460ad01
-
SHA1
ba6c3a3de6c4d9fd8f77c4353264a1fe32997fc5
-
SHA256
12fc8ac91269f86602d91c2fd967fc8032adc06564639135fb2aaa48975bed94
-
SHA512
438764d796d7630854f58871f511e698d14cdbd06059bf4dbd9e495cb1b0f4b19135abd85522db7abec6a755508268e9574e4b0cbc41a3165b07c9a93dff493f
-
SSDEEP
192:g6Hwjfkx50VVG/dzugi9ngA9iaq0VPAQY0ViMKRKBfqQ6AtD+aq43:g6HwjcxWVVolTHA9RJ1ZlMoCPc+aq43
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 14 raw.githubusercontent.com 16 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4220 msedge.exe 4220 msedge.exe 1468 msedge.exe 1468 msedge.exe 4360 identity_helper.exe 4360 identity_helper.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1468 wrote to memory of 4956 1468 msedge.exe 84 PID 1468 wrote to memory of 4956 1468 msedge.exe 84 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4912 1468 msedge.exe 85 PID 1468 wrote to memory of 4220 1468 msedge.exe 86 PID 1468 wrote to memory of 4220 1468 msedge.exe 86 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87 PID 1468 wrote to memory of 1324 1468 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c2a387e0a3d12bc03d8e41ca5460ad01_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcafda46f8,0x7ffcafda4708,0x7ffcafda47182⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,15036315126910949852,3838851835859242135,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,15036315126910949852,3838851835859242135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,15036315126910949852,3838851835859242135,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,15036315126910949852,3838851835859242135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,15036315126910949852,3838851835859242135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,15036315126910949852,3838851835859242135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,15036315126910949852,3838851835859242135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,15036315126910949852,3838851835859242135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,15036315126910949852,3838851835859242135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,15036315126910949852,3838851835859242135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,15036315126910949852,3838851835859242135,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,15036315126910949852,3838851835859242135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,15036315126910949852,3838851835859242135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,15036315126910949852,3838851835859242135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6452 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,15036315126910949852,3838851835859242135,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6420 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,15036315126910949852,3838851835859242135,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD51ebeccbf4d312ca19ec32e040dd69b0c
SHA1ada2969cd02152b78d5c6df274cb4fedd5b21346
SHA25696b7187131c5600d6224206d23a7a2dc0956c1db0df98106a6a3079751170bec
SHA5128b3a5f7aeaa45c5a0e11d2f480a6ac21b743ca8c75e248c32df9b5a8c11ee1648dbe4717ff2b4e5bedeb6e91c74587bf61f704b9a90c2f2ef69f671024148fd8
-
Filesize
708B
MD5b00086932dfc79523df0d11b94389e92
SHA13e983f6903a1cfca9e711cbd0cedb6b4fa949f5e
SHA2562f4471ca9306a7f29d35645b444588f0e912ee39bb50588a6b94ceb718422ea1
SHA512d89b71fae02a2f0744f3b636b3c4ee984882f6720e891cae24e03b7b394fc0c27e2b8efadb9f4af830dcef7caf9bc3c866a24d703e134139d2d26353808a5235
-
Filesize
5KB
MD56d32be413317a92d1635545c9ac8c37c
SHA10d55fb87f4f143d1bb6cb288d0955504ea151daa
SHA256722ce66db821fafc7f0738eebfe175518e1d769e3db515a2185b44480d789849
SHA5120ade382a994d52f2c53d56e866d4fde07eca8091b670db884ea0a5990d9495ba5417bdf3d013dd875272177a57ce66f044fef6d901c8767dbcc4d00bbeedd06b
-
Filesize
6KB
MD539aedbc31938d91b1071a0d84a311ee5
SHA1121fdfb63d9ac4b582b4af85caa0cd744b0c0df7
SHA25641d93ce82a636c204ef8df7270b857399b21a4ca2ec75239d6bd1aab33c0abec
SHA51245f58808cec8a08c7366fad4bf2f66fd9d9d64b5de7b119cc7fc6b86fe490878c4b3a8e6ad6e967fab946fbaf3f33ac1413a4c9e68968bf9af4997a48232abc5
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5a157e59af65e557622262a7e9e11ca60
SHA1b56aef9be33f8562533c52a6009ac615807108ca
SHA2565d4939b9c9789b3567412fdf140c7a163ee77e605d11e854fbfd7d057602c9a8
SHA512bf52146dccaca4a1f97dad4bda606f61e0d266a86554582a7fe20c424c7a4d00b05f7aa07075d464ed2db0f1cd6375ca6b11b1b0863bc75d847c8715c805c9b6