Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe
Resource
win10v2004-20240412-en
General
-
Target
1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe
-
Size
56KB
-
MD5
917c6cc6e5b048e49a7643420e159f00
-
SHA1
29443ce4b55d294023a2282df82508f86dee117d
-
SHA256
1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed
-
SHA512
b0d95a1c9b74f25f3a285ec04d4853277f889cbd997a2e7a87e0a9fd52160994c90845e4a94214d2a865c1ca79fee23b7e4cdb6653c54383373f26083ad17947
-
SSDEEP
1536:SqkcMAQgnRt9UdLw6BNMyBhXZxHJ6P6D5B0qEy:Mgz07JjD5B7
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zaoamoc.exe -
Executes dropped EXE 1 IoCs
pid Process 1728 zaoamoc.exe -
Loads dropped DLL 2 IoCs
pid Process 2188 1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe 2188 1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /T" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /s" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /G" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /l" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /i" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /W" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /J" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /u" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /k" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /U" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /y" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /f" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /A" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /P" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /m" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /S" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /F" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /B" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /d" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /e" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /Q" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /D" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /z" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /L" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /V" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /Z" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /p" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /H" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /R" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /M" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /t" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /a" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /v" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /j" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /O" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /I" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /C" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /E" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /g" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /K" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /Y" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /X" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /N" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /q" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /o" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /b" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /c" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /x" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /w" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /h" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /n" zaoamoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\zaoamoc = "C:\\Users\\Admin\\zaoamoc.exe /r" zaoamoc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe 1728 zaoamoc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2188 1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe 1728 zaoamoc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1728 2188 1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe 28 PID 2188 wrote to memory of 1728 2188 1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe 28 PID 2188 wrote to memory of 1728 2188 1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe 28 PID 2188 wrote to memory of 1728 2188 1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe 28 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27 PID 1728 wrote to memory of 2188 1728 zaoamoc.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe"C:\Users\Admin\AppData\Local\Temp\1be87792a07f8f9ad9b12a5f9a14c225634f4cd03bb1aa82637984c6299cf2ed.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\zaoamoc.exe"C:\Users\Admin\zaoamoc.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5dadc4203ff86eee92e2141628a5dc14a
SHA1e652a1dfdcda548698e06e114d04b9e8b019cdc7
SHA2564bf164313edc092c6ca743dd985108234da33778d5bb06f4dc7df06ea170804f
SHA512fcb0f449b54b1d93b849201a3045b54c447fe2ef09a8a2aaf9f7114e801d4c6fa4ffe2356002374301468b8120a83d3176b5b0469d374a8d5fd6e9b072f27309