Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 00:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Gren812/NOph34/raw/main/2024TT040199992038716279_pdf.7z
Resource
win10v2004-20240419-en
General
-
Target
https://github.com/Gren812/NOph34/raw/main/2024TT040199992038716279_pdf.7z
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 raw.githubusercontent.com 9 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133595155470344301" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeCreatePagefilePrivilege 2012 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 4912 2012 chrome.exe 84 PID 2012 wrote to memory of 4912 2012 chrome.exe 84 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 4148 2012 chrome.exe 85 PID 2012 wrote to memory of 3160 2012 chrome.exe 86 PID 2012 wrote to memory of 3160 2012 chrome.exe 86 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87 PID 2012 wrote to memory of 712 2012 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Gren812/NOph34/raw/main/2024TT040199992038716279_pdf.7z1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb5cc1cc40,0x7ffb5cc1cc4c,0x7ffb5cc1cc582⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1868,i,15652732378569834893,9787869118609141734,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=1864 /prefetch:22⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,15652732378569834893,9787869118609141734,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2168 /prefetch:32⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,15652732378569834893,9787869118609141734,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=2428 /prefetch:82⤵PID:712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,15652732378569834893,9787869118609141734,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,15652732378569834893,9787869118609141734,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4796,i,15652732378569834893,9787869118609141734,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4808 /prefetch:82⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4800,i,15652732378569834893,9787869118609141734,262144 --variations-seed-version=20240418-180204.077000 --mojo-platform-channel-handle=4884 /prefetch:82⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:2820
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1440
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD54bd23183fdf23bbe26f02c47a784680d
SHA15092129828712aa28a4f3d0b6b6a1d64eb6c77d9
SHA256168e68ad1ac51cac1358e9f84d984f56451290f85348ae48d79202cefee6d720
SHA512a30259bb9763c3bb6ce1004756275ea4437d6a6fb42dcbbe01203a040a95ed050cdee2f3830fc8432d9670d007f07d1f7fbeb71ba4db8f1d4a4401e2d4507a2e
-
Filesize
2KB
MD565a4cfb3f96772545341144df032bf80
SHA1c2f19186e156cdacd1d69afe586a386e2813d761
SHA25678b671050ac243a75f0b17a04dfc0edf25cfe1c61fd58ee6a12359b230747dcd
SHA512ca0262b9cd0a1d23625069c34448b91f33dca308aa54e8848a6d4ffca267e8aa51bc3dfe14d3778a6e3359067aa752031c5e796b390e3c9992df11f6dd813452
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
689B
MD5923035d63fb2988953e904d8b9ea483c
SHA1efed570bdd54109fd9fc202475a20a0beb460474
SHA2561020b94d2ab642d70098cacbfed05360810949ca24fb2dd76b0047d9f67f9498
SHA512329172fac77ea746f5e52b2f2344e693fdc96840d073301ca72442250333b7d1fbf349cec02de03197d8187a48322cbdb5ed5f8fc12fd46c2c165ccf4535e4e9
-
Filesize
8KB
MD5742b0e3b96026177324cdc977246291d
SHA182263027c7e92324f899b67e6575fb4939890b5c
SHA256d575f5f8f600b10ebdd0f2929de617c3315624f1ff555cbac5c257dff7e55764
SHA51283b31ba44282dafcd4aaacc9f42f76f3853802035b504c27e3e391e66a59b8744e0d300c85dccee5b4077468722f6e8018acc1a29e4f717d9dbfc662e975a0e3
-
Filesize
9KB
MD567a412856ecbbb8531e304712c455c09
SHA15d03e895b84c82fc2b4c418eb4b96eee29716f5f
SHA2565ba163e51ab1e59b7df5c7560209dd1181e0aea91f3a67006d743eaa85f54ecc
SHA512637ac89c81cb11fc5743506c310f6241be6fb7469a1921110d4310968d171d463e449a8a6a56ed9259c40c6cfb344cece15eb0e646ca14c6a1292a9b85d15345
-
Filesize
9KB
MD527e4b7ba8d2184432b02d4367a30312f
SHA13eae0874bd91ff780b162883821438cfcc1c17e7
SHA256e013bb896f5b4d3b2db523010ae9021adf7f78abd0491ec7d2cff1702f5977ad
SHA5123c2b2160271a9128c8bc1379ae707832cb560f7c70c4fe05bb3c011d52c661d4849d9174c8234138f551aa5ed3747674cbc51a766c800f753c3732dce5c69797
-
Filesize
9KB
MD5ba05dab485b977f48e917ae8b681331f
SHA14579b76f28fb91df5f624316d35d80846ef6c9e7
SHA256c28f78b777558f15f8886d4c818a1fb71549e2460ae595e281905ed237f5340f
SHA512f2a4d69f859c41936bc2293bea1ea37efb79b623d0b827136d021676684fabcb774fdf42bb13b8d9c5542d62c1e889697bc9830a69def371acef4725098a6e72
-
Filesize
9KB
MD549b44907a6d30e8e38c9af117ac8a6e1
SHA17eb22623f9757c145e2f8869ffa8f9cbd9d8e114
SHA256e5a1f14e83ba22e35430ad77385dfecbafe20e2c5e82f27c77e7bb1f6e56a933
SHA5122b1c4226ed88bc0c288076e67161cde30aa4f209404d7424bcef74789b73ddddfc830faa2a9dd5fc50034a67eaa6ce5fa38ea2fc9ab1d4ba4c9a13a427a9611c
-
Filesize
8KB
MD55682cc8ee8fb582ef828a45ec5fa0747
SHA17d7ad76ee4ee94dd97a157cc5d81979f952264c9
SHA2568629e19262ba842a5be4ce2fea05e930643807fa2cb38df7366c65a114325d8b
SHA51215f63510dc1a66ebeaa0ac1abd3eed26ed12ac7372245226cffb9b17c2cbfe5cd44cd97847f3d319dfe6472ff808e3c195028a186191485881ea430a0262dc88
-
Filesize
9KB
MD5a8168ad897bc37397ff8fd46310bfc10
SHA1641781660c145992f928708b63ec31f9bfa3eb2a
SHA256d42a2c5329e81998f80fa0a92ee143cb2f60450907ba9dfcc0a8ae60f09fb6f1
SHA512fd2104a3306f3b4eeb891cc3984e8c9651fb44d0224d03b28cb3833b4a66d96e891c16be4d136784cc039ec7fe4b38960e3a8ce9d0f1e987902a887c192169f7
-
Filesize
77KB
MD5c5da92c055c933d5a0a82d488162c158
SHA10d2d65e268b556ca96860cbeae83e9e9d44977d8
SHA256853e79712b74f1f7683a0dd0c1441019115f8ed73835fab530f5d82ddb14fb9d
SHA51261a1a89edffbdbe74ff15fc1fbc2a769c0305e0af978bb7a0b845dd0139ac20cd9a9af5b6e572f6efb548605f38ece9d6555b2b41ea03287754992d69e8eb7e7
-
Filesize
77KB
MD5eb9b92d03bdcee16f0430af7fc14d7cd
SHA1caccd1055eb5a774fedc37495bb7a991187c26af
SHA25606ebecb057e4d867a471378c9bb3a9189e8ce29051bb70886d6c82e7fe924892
SHA512390498c0e54d23ec4501e05a99e0338249dad202ae6c0de684b45508aa018d1e9408ef7dfa5a1759a0489bb60aaff89945ca137976053dc789eac78fe65bae87
-
Filesize
30KB
MD530b34cb2c778c1bd2ac63776780393dc
SHA131951ad1fd493d23871f9d5bcc8a14186baf1c94
SHA256db3d701e4f637c83566647545c192c8ebe8ac8a102b50a6f0b9c49ebe80ce580
SHA512f2037abdb87ef1158d3cceeff1957ed661cd5ef224737e077fe0221b179f3ca22dab3e7f1b9aebffa8b8c7a66c4f91719979aefb8bb8e722a28b742243df5566