Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
72ccd0cdc33f2be6ed973173fbb3037bb87d69282a54596035c1ed4cd81805ed.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
72ccd0cdc33f2be6ed973173fbb3037bb87d69282a54596035c1ed4cd81805ed.exe
Resource
win10v2004-20220812-en
General
-
Target
72ccd0cdc33f2be6ed973173fbb3037bb87d69282a54596035c1ed4cd81805ed.exe
-
Size
232KB
-
MD5
27a2cf0c00fda3856479dcd98c604f80
-
SHA1
798ca709b5f494a886aa1a44483d62ac5ebde3b2
-
SHA256
72ccd0cdc33f2be6ed973173fbb3037bb87d69282a54596035c1ed4cd81805ed
-
SHA512
4be18207020ec98dc8c91783c818316088dc3203f5013f05b81e3d289fe0515d89845caa56445f53b7463fbb270266a5495e79cffd822ce844f02eae3a0ca6ac
-
SSDEEP
1536:GjzUcGGomoDo0omoEo4A5AVzotokoXoOoioVo2oEogoFoPoeoWooo7oxozoZoMov:MUcGJA5AVap/Q
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" veazoem.exe -
Executes dropped EXE 1 IoCs
pid Process 1756 veazoem.exe -
Loads dropped DLL 2 IoCs
pid Process 1600 72ccd0cdc33f2be6ed973173fbb3037bb87d69282a54596035c1ed4cd81805ed.exe 1600 72ccd0cdc33f2be6ed973173fbb3037bb87d69282a54596035c1ed4cd81805ed.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /v" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /Y" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /O" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /k" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /b" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /W" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /l" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /X" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /x" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /a" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /f" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /y" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /S" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /e" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /s" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /I" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /r" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /Q" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /M" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /A" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /N" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /B" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /w" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /m" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /d" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /u" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /z" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /i" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /P" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /E" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /D" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /C" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /U" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /o" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /H" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /R" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /c" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /g" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /j" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /p" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /G" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /T" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /h" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /F" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /n" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /Z" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /J" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /q" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /V" veazoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\veazoem = "C:\\Users\\Admin\\veazoem.exe /t" veazoem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe 1756 veazoem.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1600 72ccd0cdc33f2be6ed973173fbb3037bb87d69282a54596035c1ed4cd81805ed.exe 1756 veazoem.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1756 1600 72ccd0cdc33f2be6ed973173fbb3037bb87d69282a54596035c1ed4cd81805ed.exe 27 PID 1600 wrote to memory of 1756 1600 72ccd0cdc33f2be6ed973173fbb3037bb87d69282a54596035c1ed4cd81805ed.exe 27 PID 1600 wrote to memory of 1756 1600 72ccd0cdc33f2be6ed973173fbb3037bb87d69282a54596035c1ed4cd81805ed.exe 27 PID 1600 wrote to memory of 1756 1600 72ccd0cdc33f2be6ed973173fbb3037bb87d69282a54596035c1ed4cd81805ed.exe 27 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15 PID 1756 wrote to memory of 1600 1756 veazoem.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\72ccd0cdc33f2be6ed973173fbb3037bb87d69282a54596035c1ed4cd81805ed.exe"C:\Users\Admin\AppData\Local\Temp\72ccd0cdc33f2be6ed973173fbb3037bb87d69282a54596035c1ed4cd81805ed.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\veazoem.exe"C:\Users\Admin\veazoem.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5d332dc1c08a146783f516410a73928cd
SHA18e1f4adbf904b19a1802507255ede45a189d2b58
SHA2569c5750055fa5ddb4b24a744e357298332d38eef13b895f7f60aa1c5ca27af92f
SHA512179ad9506941c9322e20f1d8fc897d097ac9007cbe2b5603aa6bee3ef25ae32830dc9539a8b482714ba4dd69a1aa24767b8eb9a508bc091e473e59d73e4aca08
-
Filesize
232KB
MD5d332dc1c08a146783f516410a73928cd
SHA18e1f4adbf904b19a1802507255ede45a189d2b58
SHA2569c5750055fa5ddb4b24a744e357298332d38eef13b895f7f60aa1c5ca27af92f
SHA512179ad9506941c9322e20f1d8fc897d097ac9007cbe2b5603aa6bee3ef25ae32830dc9539a8b482714ba4dd69a1aa24767b8eb9a508bc091e473e59d73e4aca08
-
Filesize
232KB
MD5d332dc1c08a146783f516410a73928cd
SHA18e1f4adbf904b19a1802507255ede45a189d2b58
SHA2569c5750055fa5ddb4b24a744e357298332d38eef13b895f7f60aa1c5ca27af92f
SHA512179ad9506941c9322e20f1d8fc897d097ac9007cbe2b5603aa6bee3ef25ae32830dc9539a8b482714ba4dd69a1aa24767b8eb9a508bc091e473e59d73e4aca08
-
Filesize
232KB
MD5d332dc1c08a146783f516410a73928cd
SHA18e1f4adbf904b19a1802507255ede45a189d2b58
SHA2569c5750055fa5ddb4b24a744e357298332d38eef13b895f7f60aa1c5ca27af92f
SHA512179ad9506941c9322e20f1d8fc897d097ac9007cbe2b5603aa6bee3ef25ae32830dc9539a8b482714ba4dd69a1aa24767b8eb9a508bc091e473e59d73e4aca08