Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24/04/2023, 10:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://protect-eu.mimecast.com/s/ViakC19zmCjLZVYUG61an?domain=bit.ly
Resource
win10-20230220-en
General
-
Target
https://protect-eu.mimecast.com/s/ViakC19zmCjLZVYUG61an?domain=bit.ly
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133268114012100060" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 1460 chrome.exe 1460 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe Token: SeShutdownPrivilege 4452 chrome.exe Token: SeCreatePagefilePrivilege 4452 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe 4452 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4452 wrote to memory of 4512 4452 chrome.exe 66 PID 4452 wrote to memory of 4512 4452 chrome.exe 66 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 3016 4452 chrome.exe 68 PID 4452 wrote to memory of 2568 4452 chrome.exe 69 PID 4452 wrote to memory of 2568 4452 chrome.exe 69 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70 PID 4452 wrote to memory of 3528 4452 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://protect-eu.mimecast.com/s/ViakC19zmCjLZVYUG61an?domain=bit.ly1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb83109758,0x7ffb83109768,0x7ffb831097782⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1752,i,16712067413243057489,1180681164488177181,131072 /prefetch:22⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1988 --field-trial-handle=1752,i,16712067413243057489,1180681164488177181,131072 /prefetch:82⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2124 --field-trial-handle=1752,i,16712067413243057489,1180681164488177181,131072 /prefetch:82⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1752,i,16712067413243057489,1180681164488177181,131072 /prefetch:12⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1752,i,16712067413243057489,1180681164488177181,131072 /prefetch:12⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4384 --field-trial-handle=1752,i,16712067413243057489,1180681164488177181,131072 /prefetch:12⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1752,i,16712067413243057489,1180681164488177181,131072 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 --field-trial-handle=1752,i,16712067413243057489,1180681164488177181,131072 /prefetch:82⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3308 --field-trial-handle=1752,i,16712067413243057489,1180681164488177181,131072 /prefetch:82⤵PID:804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3060 --field-trial-handle=1752,i,16712067413243057489,1180681164488177181,131072 /prefetch:82⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 --field-trial-handle=1752,i,16712067413243057489,1180681164488177181,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5000
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456B
MD54b2a344b541dad525d0ac00d9b05e527
SHA199fafa94ecc7d0fe59d8e1e99132e2d4f7d18853
SHA25669c3748b6cf272947143a1f465d6781f62c89bdf5f8469632daacb9661495f20
SHA512d57adbb81131806749120d548c98dcbfd11f3b04130a1b43f035743cbd676f528da959378ab2ac68ce03f5c77f99a578c48a82f4663d1008a87e272644b3a0cf
-
Filesize
1KB
MD5c421e7cde424534717286b586b7db9ff
SHA1ddd01d6f2024323fcb35dc8ed87d5761f188bfca
SHA2568e257970df9be8f94b935b2ad94105db867c2eafd32f069f8d6824758b3bc43b
SHA5122952fdfc7ec440eebda1f131e484bee893fcd0a923650c95b868e1fdb1b78976019d3ee59b1367af1fe6bb30a157cec99684a486a901b4c674e2230710666516
-
Filesize
874B
MD51c9549a2de2b776c8f0e3d1a37c549dd
SHA194c0a2ce1d7e9d09bccd8a099cbfcc940855c429
SHA2563eba9a01e24f690b531527735eaf921d8193df300a6369e434bee7cf0994af97
SHA5126f7cd51cbd1a5f34c33843fe286b4fda6914b8239f013d5a36902c3baf78a3cd41bdbf6ba536cf303b4e677d157422d876f5baf8490f85daa3876fd903dd13a1
-
Filesize
6KB
MD50e035d3323018b2eb405ed037636a137
SHA16775acf2931abd73a66a9190ac4b9687a61228fb
SHA2560244f469a2650e2fd02879300adc9b0fa508c2598b9a0ec45fafe0b5080de495
SHA512f7b3bd58a0edbd8d968b7a44433001f55aaff1d0cac544af0550f2328a4f8ad3953b3b9f915fcddbde8f8f890952aa3ad07d85e6f4b57cfe23253dc8ca55104d
-
Filesize
6KB
MD5076111a62fc11d0093fbbc171781cca2
SHA160219f58d5701544cf6299ce888f2aa740470c70
SHA2568b838ab5fed9df1be9c6a2fad16c81b32718798d181171b47815b32d6f1dba76
SHA512abd5911493df1499f4cb0b22174baa0691c6c990140cd3f6bacf07d405378fcc0dee19351e733a128f1658dff66384f9d367e8c355f16c4e606d665844956d32
-
Filesize
6KB
MD5f6ff49397c927d57f14a8e99108021ef
SHA12609fe6f90f129038e5eadc4e6ddd8abb1543ec3
SHA256cb3ef925249bdf2a6388b356aae680d8275d14a6f042bd8f9951d4ce2f544268
SHA5122bfecabb444af20156a7733ad4ae7d424d8e0ddb0acc49af24cf06ec4c5b0981bf4a270e7845158fba6e634dfa85bb8981c1ab34e2da002f95512ce0ca406b47
-
Filesize
203KB
MD5cae5536aad2041e3c1e78cc58d649f6b
SHA19fab862237424c4f7cb3b232f94644b62a348188
SHA256139ac4b85a5bb59feb0c64bfcd51735bc512f150dcf6d762574764272a721647
SHA512a402d02df53cbaea9ec1c0942534dcc9de008b9640e54b46a6b5e70ab21ba24fd6243ed41c6f9a83e22668ccad2ffb685f3e04bde84af3fcb86523299dde9156
-
Filesize
72KB
MD53f994908d0ee976ed5d9957777e59a09
SHA1c9543d007e275dd7b452fe1022b11ce6a7644dd9
SHA25670a6e79ed58f99666cfd06157a9e2f6fdea5fb8f09dcff2ad92963a5a194633d
SHA51232694680b385394f321d7d010e53d7cfd8705c9e94f4e2b0b1b08dc52af23f0dbf184686fe5a69fac7c62c2a976bf80c5e8bead4fd51e04c67bb0e9351ff59bf
-
Filesize
202KB
MD546efe26daa2d2a7617ffc1906dc84cdc
SHA15868cb19545c2a3e5455a1b832fd1adbe0184974
SHA256b5b63ae27f69c99d9597be5c2070fb7c69ffa8ea7f0ca9cfde4f2d7852c0f7d0
SHA51242a4d91493c91077f88a615a8f8882e854152f9e2de33a761d012416b2a20052dcbfaf858cdb10f94e3873ebc20f3c90cf79f3e0eccdbc64258b733c80163ef0
-
Filesize
203KB
MD5355c4299d0b27223b1a19ffe7d8f6a1c
SHA106b046e523679e4e8de1d3f54b6f86c569c0a2b5
SHA256e062638b21a013385aee03c68816e25df83cbfdd26d7d5cb42be3e963b913b9f
SHA512ab9ec401f83e0db8b25b9a35040867f134dc0de1f2982d9a0fe2de3c5d5898f2afc516dbd92b24b980204fd2e9c6fb7b7a7674eadcb1c71775ccdfca83880721
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd