Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:29
Static task
static1
Behavioral task
behavioral1
Sample
2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe
Resource
win10v2004-20220901-en
General
-
Target
2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe
-
Size
601KB
-
MD5
3033793cdcf6068f2e163a9ebc91ebc3
-
SHA1
6a04fbf61fc5bbc4e29f19e7e458992326ec68e2
-
SHA256
2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5
-
SHA512
ae80a42a51c2ee87d3a4fa13acf34712c44a17bd0e6d4a0b1129c431b78d465c2ac6333d58fd7d43a3c28db51cb7790b7346a709ee02c3988681eff804b30af5
-
SSDEEP
12288:VIny5DYT8tSg0Bzh9aHUC2UHOYqkK4tKqXku9FEbFJMc7PRSszc0:hUTwTHmkK4kSkucJ+cYQc
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exedescription ioc process File created C:\Windows\system32\drivers\nethfdrv.sys 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe -
Executes dropped EXE 5 IoCs
Processes:
installd.exenethtsrv.exenetupdsrv.exenethtsrv.exenetupdsrv.exepid process 3760 installd.exe 1900 nethtsrv.exe 4968 netupdsrv.exe 1764 nethtsrv.exe 3572 netupdsrv.exe -
Loads dropped DLL 14 IoCs
Processes:
2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exeinstalld.exenethtsrv.exenethtsrv.exepid process 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe 3760 installd.exe 1900 nethtsrv.exe 1900 nethtsrv.exe 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe 1764 nethtsrv.exe 1764 nethtsrv.exe 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
Processes:
2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exedescription ioc process File created C:\Windows\SysWOW64\netupdsrv.exe 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe File created C:\Windows\SysWOW64\hfnapi.dll 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe File created C:\Windows\SysWOW64\hfpapi.dll 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe File created C:\Windows\SysWOW64\installd.exe 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe File created C:\Windows\SysWOW64\nethtsrv.exe 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe -
Drops file in Program Files directory 3 IoCs
Processes:
2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exedescription ioc process File created C:\Program Files (x86)\Common Files\Config\data.xml 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
Processes:
nethtsrv.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 660 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nethtsrv.exedescription pid process Token: SeDebugPrivilege 1764 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exenet.exenet.exenet.exenet.exedescription pid process target process PID 5080 wrote to memory of 1412 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe net.exe PID 5080 wrote to memory of 1412 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe net.exe PID 5080 wrote to memory of 1412 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe net.exe PID 1412 wrote to memory of 3516 1412 net.exe net1.exe PID 1412 wrote to memory of 3516 1412 net.exe net1.exe PID 1412 wrote to memory of 3516 1412 net.exe net1.exe PID 5080 wrote to memory of 4260 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe net.exe PID 5080 wrote to memory of 4260 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe net.exe PID 5080 wrote to memory of 4260 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe net.exe PID 4260 wrote to memory of 1752 4260 net.exe net1.exe PID 4260 wrote to memory of 1752 4260 net.exe net1.exe PID 4260 wrote to memory of 1752 4260 net.exe net1.exe PID 5080 wrote to memory of 3760 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe installd.exe PID 5080 wrote to memory of 3760 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe installd.exe PID 5080 wrote to memory of 3760 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe installd.exe PID 5080 wrote to memory of 1900 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe nethtsrv.exe PID 5080 wrote to memory of 1900 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe nethtsrv.exe PID 5080 wrote to memory of 1900 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe nethtsrv.exe PID 5080 wrote to memory of 4968 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe netupdsrv.exe PID 5080 wrote to memory of 4968 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe netupdsrv.exe PID 5080 wrote to memory of 4968 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe netupdsrv.exe PID 5080 wrote to memory of 4904 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe net.exe PID 5080 wrote to memory of 4904 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe net.exe PID 5080 wrote to memory of 4904 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe net.exe PID 4904 wrote to memory of 2320 4904 net.exe net1.exe PID 4904 wrote to memory of 2320 4904 net.exe net1.exe PID 4904 wrote to memory of 2320 4904 net.exe net1.exe PID 5080 wrote to memory of 1420 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe net.exe PID 5080 wrote to memory of 1420 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe net.exe PID 5080 wrote to memory of 1420 5080 2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe net.exe PID 1420 wrote to memory of 4824 1420 net.exe net1.exe PID 1420 wrote to memory of 4824 1420 net.exe net1.exe PID 1420 wrote to memory of 4824 1420 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe"C:\Users\Admin\AppData\Local\Temp\2fcbf9a5ed962182d239fcd21e793daed62c497bc42d1904319a46af2909ffc5.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:3516
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1752
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3760 -
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1900 -
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:4968 -
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:2320
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:4824
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:3572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD58912b56c85206e4282c0b48f2e046b00
SHA11d90a09987b685ad1471ff9152cee461e9782213
SHA256d02f33b1e693cc386f44153cb9f186a5694b0bb8d160cd69ec232d732298d296
SHA5124754b5d198abe1869fc2144a746189234dd243844b3876f7b9aae87e2c9fd1073bb3e2df91bc06aea5e64ded5eddcc237daeefae3812b69963ce16bc2038d059
-
Filesize
106KB
MD58912b56c85206e4282c0b48f2e046b00
SHA11d90a09987b685ad1471ff9152cee461e9782213
SHA256d02f33b1e693cc386f44153cb9f186a5694b0bb8d160cd69ec232d732298d296
SHA5124754b5d198abe1869fc2144a746189234dd243844b3876f7b9aae87e2c9fd1073bb3e2df91bc06aea5e64ded5eddcc237daeefae3812b69963ce16bc2038d059
-
Filesize
106KB
MD58912b56c85206e4282c0b48f2e046b00
SHA11d90a09987b685ad1471ff9152cee461e9782213
SHA256d02f33b1e693cc386f44153cb9f186a5694b0bb8d160cd69ec232d732298d296
SHA5124754b5d198abe1869fc2144a746189234dd243844b3876f7b9aae87e2c9fd1073bb3e2df91bc06aea5e64ded5eddcc237daeefae3812b69963ce16bc2038d059
-
Filesize
106KB
MD58912b56c85206e4282c0b48f2e046b00
SHA11d90a09987b685ad1471ff9152cee461e9782213
SHA256d02f33b1e693cc386f44153cb9f186a5694b0bb8d160cd69ec232d732298d296
SHA5124754b5d198abe1869fc2144a746189234dd243844b3876f7b9aae87e2c9fd1073bb3e2df91bc06aea5e64ded5eddcc237daeefae3812b69963ce16bc2038d059
-
Filesize
241KB
MD509dfa0e7c47022b3217677f52f258be8
SHA1dabb9f3b3399ba73b181d6061ec6dd0b210abfae
SHA256f9286c442ee5a6a02851f75c347d35507adb67a9c994e29a88a065cb8aca6836
SHA51272d7dd9d623e9994b182749c613af90eaf211db79761b90cc438832ae9380afe037f401cb20be5ce6502b80759ecd446c567015824ec136d9f25ad53b90411ce
-
Filesize
241KB
MD509dfa0e7c47022b3217677f52f258be8
SHA1dabb9f3b3399ba73b181d6061ec6dd0b210abfae
SHA256f9286c442ee5a6a02851f75c347d35507adb67a9c994e29a88a065cb8aca6836
SHA51272d7dd9d623e9994b182749c613af90eaf211db79761b90cc438832ae9380afe037f401cb20be5ce6502b80759ecd446c567015824ec136d9f25ad53b90411ce
-
Filesize
241KB
MD509dfa0e7c47022b3217677f52f258be8
SHA1dabb9f3b3399ba73b181d6061ec6dd0b210abfae
SHA256f9286c442ee5a6a02851f75c347d35507adb67a9c994e29a88a065cb8aca6836
SHA51272d7dd9d623e9994b182749c613af90eaf211db79761b90cc438832ae9380afe037f401cb20be5ce6502b80759ecd446c567015824ec136d9f25ad53b90411ce
-
Filesize
108KB
MD536ef2286f0ce99f63bb528dd454852b0
SHA1f7f2b1e71214cd72ccda576a792d4e1920058df8
SHA25628380a56111b68eaad4030bee14f61b12a2102143def86266b60f8dd8978e6c2
SHA51218f83f4522f918e2df33b4c22c63e9999cc6bfe4b14f792271ad246a69dc14d0d6efd1e0893019027b7aeef406cb544d74347b1afeac4e27707f3d8b176f6f80
-
Filesize
108KB
MD536ef2286f0ce99f63bb528dd454852b0
SHA1f7f2b1e71214cd72ccda576a792d4e1920058df8
SHA25628380a56111b68eaad4030bee14f61b12a2102143def86266b60f8dd8978e6c2
SHA51218f83f4522f918e2df33b4c22c63e9999cc6bfe4b14f792271ad246a69dc14d0d6efd1e0893019027b7aeef406cb544d74347b1afeac4e27707f3d8b176f6f80
-
Filesize
176KB
MD599d0ad7af34c8a7ada18423ab7b3aab1
SHA1903cc17fe3948fc718c2e988dbf2e2010073215f
SHA2565b230192ee550e1dc14ccf87431e5c42cf15509a454100bd1ec9b028fd590aec
SHA51282f91f072c78dea52937364c0d08b58809e1be499f1003a44d7fa8c824cfd94ce4dd0aefff2f85662c694be8a835cfcca88a0d08a4edb51035ff368d194367c7
-
Filesize
176KB
MD599d0ad7af34c8a7ada18423ab7b3aab1
SHA1903cc17fe3948fc718c2e988dbf2e2010073215f
SHA2565b230192ee550e1dc14ccf87431e5c42cf15509a454100bd1ec9b028fd590aec
SHA51282f91f072c78dea52937364c0d08b58809e1be499f1003a44d7fa8c824cfd94ce4dd0aefff2f85662c694be8a835cfcca88a0d08a4edb51035ff368d194367c7
-
Filesize
176KB
MD599d0ad7af34c8a7ada18423ab7b3aab1
SHA1903cc17fe3948fc718c2e988dbf2e2010073215f
SHA2565b230192ee550e1dc14ccf87431e5c42cf15509a454100bd1ec9b028fd590aec
SHA51282f91f072c78dea52937364c0d08b58809e1be499f1003a44d7fa8c824cfd94ce4dd0aefff2f85662c694be8a835cfcca88a0d08a4edb51035ff368d194367c7
-
Filesize
158KB
MD5b28cb7e780efc1671bf30e495b526df4
SHA10f028a845a7c313feff8540137d8d8e08d06d908
SHA2561f54b8c4fef919b14f9675f6bf8d3e19ac9291b236bea34abffca97a1b61cc26
SHA512ae834d8496cb0d5e1deff3bb196fba7f9918fdefdb80e18b5bb8719affed637bb612cf6b03db7fca45178b26ebf6468927c893ed6a74d1cfc6e7c470117a9df5
-
Filesize
158KB
MD5b28cb7e780efc1671bf30e495b526df4
SHA10f028a845a7c313feff8540137d8d8e08d06d908
SHA2561f54b8c4fef919b14f9675f6bf8d3e19ac9291b236bea34abffca97a1b61cc26
SHA512ae834d8496cb0d5e1deff3bb196fba7f9918fdefdb80e18b5bb8719affed637bb612cf6b03db7fca45178b26ebf6468927c893ed6a74d1cfc6e7c470117a9df5
-
Filesize
158KB
MD5b28cb7e780efc1671bf30e495b526df4
SHA10f028a845a7c313feff8540137d8d8e08d06d908
SHA2561f54b8c4fef919b14f9675f6bf8d3e19ac9291b236bea34abffca97a1b61cc26
SHA512ae834d8496cb0d5e1deff3bb196fba7f9918fdefdb80e18b5bb8719affed637bb612cf6b03db7fca45178b26ebf6468927c893ed6a74d1cfc6e7c470117a9df5