Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 19:00
Static task
static1
Behavioral task
behavioral1
Sample
f47a7701d8d7163eb389c520790b2f3bd95c4b6609d3eaff2cddd2640496a80f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f47a7701d8d7163eb389c520790b2f3bd95c4b6609d3eaff2cddd2640496a80f.exe
Resource
win10v2004-20221111-en
General
-
Target
f47a7701d8d7163eb389c520790b2f3bd95c4b6609d3eaff2cddd2640496a80f.exe
-
Size
160KB
-
MD5
8fb8e157fbfbfceca0fb262f80135e66
-
SHA1
51788651a3af48b072337cdebd6b5fc010a8eb9f
-
SHA256
f47a7701d8d7163eb389c520790b2f3bd95c4b6609d3eaff2cddd2640496a80f
-
SHA512
8b44881e7f1ef8f4cd3e9d663ee89d53359a21c02ddc99893a4cc13d3e139f35bf641acb7a5b985f0fce70411a25f921a2aef4787f84cca96a160691935d11ea
-
SSDEEP
768:04lvMav7J5fT7wbjMPkG1VuW/wqvRXMXp677yCzdXZRT2Nq1MaQnepMri14PGBEo:04RlTJ5fTElGVs4emEFb
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" heupoem.exe -
Executes dropped EXE 1 IoCs
pid Process 2044 heupoem.exe -
Loads dropped DLL 2 IoCs
pid Process 1140 f47a7701d8d7163eb389c520790b2f3bd95c4b6609d3eaff2cddd2640496a80f.exe 1140 f47a7701d8d7163eb389c520790b2f3bd95c4b6609d3eaff2cddd2640496a80f.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /Z" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /W" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /N" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /G" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /o" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /y" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /K" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /Q" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /t" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /M" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /p" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /O" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /L" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /Y" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /U" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /z" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /R" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /f" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /E" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /b" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /d" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /F" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /T" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /D" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /V" heupoem.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /a" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /A" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /P" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /B" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /w" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /c" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /s" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /J" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /r" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /x" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /k" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /l" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /j" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /q" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /H" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /v" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /i" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /X" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /C" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /e" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /m" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /h" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /S" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /u" heupoem.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\heupoem = "C:\\Users\\Admin\\heupoem.exe /I" heupoem.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe 2044 heupoem.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1140 f47a7701d8d7163eb389c520790b2f3bd95c4b6609d3eaff2cddd2640496a80f.exe 2044 heupoem.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2044 1140 f47a7701d8d7163eb389c520790b2f3bd95c4b6609d3eaff2cddd2640496a80f.exe 27 PID 1140 wrote to memory of 2044 1140 f47a7701d8d7163eb389c520790b2f3bd95c4b6609d3eaff2cddd2640496a80f.exe 27 PID 1140 wrote to memory of 2044 1140 f47a7701d8d7163eb389c520790b2f3bd95c4b6609d3eaff2cddd2640496a80f.exe 27 PID 1140 wrote to memory of 2044 1140 f47a7701d8d7163eb389c520790b2f3bd95c4b6609d3eaff2cddd2640496a80f.exe 27 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16 PID 2044 wrote to memory of 1140 2044 heupoem.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\f47a7701d8d7163eb389c520790b2f3bd95c4b6609d3eaff2cddd2640496a80f.exe"C:\Users\Admin\AppData\Local\Temp\f47a7701d8d7163eb389c520790b2f3bd95c4b6609d3eaff2cddd2640496a80f.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\heupoem.exe"C:\Users\Admin\heupoem.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD51c248137d9ad3db1c22031cfcc2a2b31
SHA1b90f51b24c4da97fb16def681f17147bd985c55c
SHA256e0a7dea0832d93d9fc5cec3a016d5c7db8444e263b5f8bc20ed26bbb07c91f84
SHA512a6d78591bf770c7e65b1dbb184ad9524c946a565d1c38c3a8c15b05bb963b300bc76e8bf215d25a06df3514eea7c9c8c71fcc84ef64e63caf90a5d89483e3dbe
-
Filesize
160KB
MD51c248137d9ad3db1c22031cfcc2a2b31
SHA1b90f51b24c4da97fb16def681f17147bd985c55c
SHA256e0a7dea0832d93d9fc5cec3a016d5c7db8444e263b5f8bc20ed26bbb07c91f84
SHA512a6d78591bf770c7e65b1dbb184ad9524c946a565d1c38c3a8c15b05bb963b300bc76e8bf215d25a06df3514eea7c9c8c71fcc84ef64e63caf90a5d89483e3dbe
-
Filesize
160KB
MD51c248137d9ad3db1c22031cfcc2a2b31
SHA1b90f51b24c4da97fb16def681f17147bd985c55c
SHA256e0a7dea0832d93d9fc5cec3a016d5c7db8444e263b5f8bc20ed26bbb07c91f84
SHA512a6d78591bf770c7e65b1dbb184ad9524c946a565d1c38c3a8c15b05bb963b300bc76e8bf215d25a06df3514eea7c9c8c71fcc84ef64e63caf90a5d89483e3dbe
-
Filesize
160KB
MD51c248137d9ad3db1c22031cfcc2a2b31
SHA1b90f51b24c4da97fb16def681f17147bd985c55c
SHA256e0a7dea0832d93d9fc5cec3a016d5c7db8444e263b5f8bc20ed26bbb07c91f84
SHA512a6d78591bf770c7e65b1dbb184ad9524c946a565d1c38c3a8c15b05bb963b300bc76e8bf215d25a06df3514eea7c9c8c71fcc84ef64e63caf90a5d89483e3dbe