Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 09:04
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cloudflare-ipfs.com/ipfs/bafkreidwx525xvmzf2oxa77sgdhp2hsw5yxekmtehf3i2cczn76belwue4#[email protected]
Resource
win10v2004-20240426-en
General
-
Target
https://cloudflare-ipfs.com/ipfs/bafkreidwx525xvmzf2oxa77sgdhp2hsw5yxekmtehf3i2cczn76belwue4#[email protected]
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 cloudflare-ipfs.com 6 cloudflare-ipfs.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133598055119598072" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 2208 chrome.exe 2208 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 448 chrome.exe 448 chrome.exe 448 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 448 wrote to memory of 404 448 chrome.exe 82 PID 448 wrote to memory of 404 448 chrome.exe 82 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 532 448 chrome.exe 84 PID 448 wrote to memory of 4572 448 chrome.exe 85 PID 448 wrote to memory of 4572 448 chrome.exe 85 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86 PID 448 wrote to memory of 3092 448 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cloudflare-ipfs.com/ipfs/bafkreidwx525xvmzf2oxa77sgdhp2hsw5yxekmtehf3i2cczn76belwue4#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc531ab58,0x7ffcc531ab68,0x7ffcc531ab782⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1956,i,10464328818247761961,8956657669904763245,131072 /prefetch:22⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1956,i,10464328818247761961,8956657669904763245,131072 /prefetch:82⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2224 --field-trial-handle=1956,i,10464328818247761961,8956657669904763245,131072 /prefetch:82⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1956,i,10464328818247761961,8956657669904763245,131072 /prefetch:12⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1956,i,10464328818247761961,8956657669904763245,131072 /prefetch:12⤵PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4412 --field-trial-handle=1956,i,10464328818247761961,8956657669904763245,131072 /prefetch:12⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 --field-trial-handle=1956,i,10464328818247761961,8956657669904763245,131072 /prefetch:82⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4676 --field-trial-handle=1956,i,10464328818247761961,8956657669904763245,131072 /prefetch:82⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4144 --field-trial-handle=1956,i,10464328818247761961,8956657669904763245,131072 /prefetch:82⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1956,i,10464328818247761961,8956657669904763245,131072 /prefetch:82⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3576 --field-trial-handle=1956,i,10464328818247761961,8956657669904763245,131072 /prefetch:82⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5116 --field-trial-handle=1956,i,10464328818247761961,8956657669904763245,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f5332bf7d51a796a82777c04a91cad7e
SHA10a3c7292448c91748264ae4fed4dcab3d6495bff
SHA2560cd510a60aee6ed343ef74fbb299a579ac47b0c7cbf398dd055d0037bc1a9049
SHA512cf9e560ce00edc1ff52339380c2ea7bc3c0098b0c2af57a65ca697af466447589ed017e0cb72013c6d79a13063a0e0c5557624346cb3b77e4cae462e6dce060c
-
Filesize
3KB
MD573f9f00f99c1005bf9170fbe6f44cc92
SHA12d0dfa1d87d0737474806cb41a9242f5ee85e7d5
SHA25632713fb1fef1ed324c72d2beb96ba4c08f52c5218616acc9627630c0f7164426
SHA512f0d07f1db9ec541945e03f39acb4f4b73ff8731606fb089e7ee1318516940ace4a5f5fd89adea8d52003fc1091ef84b768f10a17980579feea8b42eeac913497
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5455d9691204c37cadfe9147d1ce52a5d
SHA1d221d23a91037f3753212e645f2bd99731422ed0
SHA25686dbddca558fc86b0075c1015a54191869bd8f7393267428baaa87fd7bb53d13
SHA51272bed1f552f7d750c3b9f64592c89f72e1806b8a07b24adbd9bd33a6254037395231feb625ab487d4a41b1c131ce49a6edf43d86ea0be4909496a9d8bf6d0bdb
-
Filesize
7KB
MD561f0e03376d0eb3c6a5efeae9501ba6b
SHA1a5e8a21375d95be94bfb228be2c823593395b66e
SHA256da6cd6b04c2c1f4a87f1f305a50ccb1fb4421059ee1a9f4b309e3f4950dc0bc8
SHA5125023c88a4d319d438c35d34f7dcf10925ab9a078320e815005f7d790bff7f2c7c19bd33dc513351964af4f3f5e4f1d4e3626663529a60e550da58c359b78e873
-
Filesize
131KB
MD539e42b35ad4c90df2f182cb9eb3f327a
SHA18b92c0d6860d94d58be621fb77f42208da1a6908
SHA2568d3de8ba4858e40d42b43e4e49782cbd505f01f5d5e254e955bc8ddd3fb251fb
SHA512c63a689d3a12c0c9131ac78904aaa1c8fb85b23abecff77ea5e3ca021c13240e010427e6b87af367aad8f6535379304f25431c7e6b873270ba214f2f68571654
-
Filesize
131KB
MD5432191f0a2372c0922d664ca92954ac9
SHA16e32d5f01402243226b21af2faba8f9094d3406d
SHA256723c9af48e1edcb1aabf5bd8d125bc9033263ea58c1001cc1223041fd70d4a4b
SHA5127c23a0d2fb499943dc1e82bc968e1b9ad54ea894c0b8225d6bc6223b70b6ce246c48b0cdc8f2016cb0e476dcb6fa8aacfadf378ac88e06abccb6e682a47bd90d
-
Filesize
132KB
MD5313b4ba7d3101c17fd63df77f5e25465
SHA1c60c3b455f32abe4b2c7b5ca0918f8792f1d15e5
SHA256d30ec956695e119fd4b18f780be071e5162d027117e7940c0fe198c7168898eb
SHA512d6160b78d42464a1e9b62cb8f60842bacd49a14970d73a2f9d6a9c965ccba0e90172bb280d0c93af07373adb9fbb7fc61a9f5e2cd38d7b2b670300a671a0d01c
-
Filesize
152KB
MD5323275407b7ab0014a42d94c41011b48
SHA113023cfda2539be41e777b47f45261d0e084efb6
SHA2564d22ea90f2fbaf65effd1dd899f31b89982e2f295f4cecd53c2958667f477924
SHA5121a6974c90d53e76897a93fefefb32335491d0a93d7d4fdb0ee43c7d7b355bde29a3db0a5f6b6006310d2d85de5b0f3b9dccca6c85c1e3a044e700c523b4f79ab
-
Filesize
91KB
MD5d83485601096349acebf2e29fd00c2e6
SHA18476f0eed278f5ebf6096d33fc2e7db02a4cbdca
SHA25641811ebf3d0317fa344bddcd7198d4e7bf9cf135b2173a5b1a00744940a51e52
SHA51209ddc1d232b01e3c38e0d30be3fdc8c1a8e19976986ade0b2e3425e9923ff11ef5d02cad9cd5e8e4ab40f40b811c5b1a571a11a8871b92bb01cde48ed013f1fa
-
Filesize
88KB
MD5d93b787a8bb0da68086f38d95d63d932
SHA143224db53150bbf3e8ebeefe16fe52854985e7a5
SHA256d600d93e2e168e8fc543dbb6265597c7badf04f6a02168b6f549ad0ed60442d0
SHA5120e4caed563850cb223e5330c2206dd9e74551dd2ef989878d67a9ee2b47ba146a228db35b635356e1c5e37bb38f566d075e4d90ab42253ec5b124622439a98f0