Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:55
Static task
static1
Behavioral task
behavioral1
Sample
4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe
Resource
win10v2004-20241007-en
General
-
Target
4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe
-
Size
161KB
-
MD5
85725516ee9c2b40590ef44935ca2cf9
-
SHA1
b10f0690a6a5d31ce81367793ec11114ed4f598b
-
SHA256
4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9
-
SHA512
1efb732fc6bc1bd16e2765ff1deac309534cfce3cf71089205d22edec38875c9d59e77c9dfd4f50a02dca4020979349b048e55f6d2ad87933f9513cdbb310f59
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvdaEkZSc5o:bYjHiqrrTKWUc5o
Malware Config
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (302) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\B: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\H: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\K: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\X: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\Z: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\G: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\I: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\O: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\U: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\V: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\R: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\T: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\Y: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\A: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\L: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\M: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\P: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\Q: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\E: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\J: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\N: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\S: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File opened (read-only) \??\W: 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe File created C:\Windows\system32\spool\PRINTERS\PP9x6rsfqe1cga7i3v47hjlc3x.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5360 ONENOTE.EXE 5360 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe Token: SeTakeOwnershipPrivilege 5004 4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5360 ONENOTE.EXE 5360 ONENOTE.EXE 5360 ONENOTE.EXE 5360 ONENOTE.EXE 5360 ONENOTE.EXE 5360 ONENOTE.EXE 5360 ONENOTE.EXE 5360 ONENOTE.EXE 5360 ONENOTE.EXE 5360 ONENOTE.EXE 5360 ONENOTE.EXE 5360 ONENOTE.EXE 5360 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5164 wrote to memory of 5360 5164 printfilterpipelinesvc.exe 100 PID 5164 wrote to memory of 5360 5164 printfilterpipelinesvc.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe"C:\Users\Admin\AppData\Local\Temp\4b1afa58bbae48bf64033a55593f1ecb7bd51b6b6e66b46b85bb19f49b6d18a9.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5992
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5164 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{E863F7AC-082D-4C6D-A2F6-5649BF266948}.xps" 1337669253087800002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5dd6e91db842265b4ff022dad172d65ff
SHA1afdb1ee1df839be1b044bf01aa75e2f132c5391c
SHA256f711d1f92e60b51079985fbb8f36d86145f3c7d77ed6b0912ddbb8555b3a6be1
SHA512854f658e7d6d2b1c01eb53f4f48749b589d415233a8747f5a6390c904de3f2970c3629fdd5cb681ee3392509c3416e03d950f4c28e245d2ad153272bf0f2120b
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD503c7993e4d3f85ccb8224126baad09ac
SHA108e4f5ea359b7ad5bda0a8e6318f29d6a9e58ada
SHA25635cb3fe508ce0d4a014205e4b9432b8a199de04836a786553a60a0069d49917c
SHA5127fd4ca2dd7fcc0d0ecef707ae33fe9339721a942d441e3908a2f5e26e2b6d1f93be44f006bef8093db7fd915d47d6ce07c06e9cc0313e0a676a48b95ad9b63ff
-
Filesize
4KB
MD5d39b30831e9eb194f6a7925016a28b20
SHA14e52c133ffb307cafcb98d93a0202b5db6d58fdf
SHA2564f012522c08a4fb6106967ad6781fc8794d48c5a18583a3f47cb2f28ab035e81
SHA5129dfc1c2f13db9e06554799e055fe8985fc9fcc1bcb47672513f505879d46824127f14d68bf687f745bfcda8fd24abb2da045c089f05b4a7ff4564ae0383a5da0
-
Filesize
3KB
MD55b4305c63d66f44752d5fa815deacb91
SHA12490af8f78d483a8cf65d3089908dfc976e6a686
SHA2569524d2a1ce3d7c111bdb8eb877c9b626f2cb21ae8e593866630bbc6227131748
SHA512ea0a61d493018fcc5bbb06a2b6387bbf9cae637e609bdbb3ea0507f8f9b43bc6d496f3f55d7f603b07a554dfe32910e1422d7184334244ca59366c9fc7257b3d