Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
290s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 03:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.brightsideclub.com/rgcRLaJcsexLGIN4ZuF-WwPQcLOScUzNE7JFlFqq4wrEiiqWtHsxur8CG3uITazuOs5N9_bZ1ranfq2yP5qKxg**A
Resource
win10v2004-20240508-en
General
-
Target
https://www.brightsideclub.com/rgcRLaJcsexLGIN4ZuF-WwPQcLOScUzNE7JFlFqq4wrEiiqWtHsxur8CG3uITazuOs5N9_bZ1ranfq2yP5qKxg**A
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133600446395506095" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 540 chrome.exe 540 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe Token: SeShutdownPrivilege 1628 chrome.exe Token: SeCreatePagefilePrivilege 1628 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe 1628 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1628 wrote to memory of 4264 1628 chrome.exe 82 PID 1628 wrote to memory of 4264 1628 chrome.exe 82 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 2280 1628 chrome.exe 84 PID 1628 wrote to memory of 1524 1628 chrome.exe 85 PID 1628 wrote to memory of 1524 1628 chrome.exe 85 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86 PID 1628 wrote to memory of 3200 1628 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.brightsideclub.com/rgcRLaJcsexLGIN4ZuF-WwPQcLOScUzNE7JFlFqq4wrEiiqWtHsxur8CG3uITazuOs5N9_bZ1ranfq2yP5qKxg**A1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fe9aab58,0x7ff8fe9aab68,0x7ff8fe9aab782⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1612 --field-trial-handle=1972,i,1340057910547865659,9894633289644155067,131072 /prefetch:22⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1900 --field-trial-handle=1972,i,1340057910547865659,9894633289644155067,131072 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2136 --field-trial-handle=1972,i,1340057910547865659,9894633289644155067,131072 /prefetch:82⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1972,i,1340057910547865659,9894633289644155067,131072 /prefetch:12⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1972,i,1340057910547865659,9894633289644155067,131072 /prefetch:12⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4220 --field-trial-handle=1972,i,1340057910547865659,9894633289644155067,131072 /prefetch:12⤵PID:1172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3428 --field-trial-handle=1972,i,1340057910547865659,9894633289644155067,131072 /prefetch:82⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3312 --field-trial-handle=1972,i,1340057910547865659,9894633289644155067,131072 /prefetch:82⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4580 --field-trial-handle=1972,i,1340057910547865659,9894633289644155067,131072 /prefetch:82⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4124 --field-trial-handle=1972,i,1340057910547865659,9894633289644155067,131072 /prefetch:82⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1972,i,1340057910547865659,9894633289644155067,131072 /prefetch:82⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1536 --field-trial-handle=1972,i,1340057910547865659,9894633289644155067,131072 /prefetch:12⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3188 --field-trial-handle=1972,i,1340057910547865659,9894633289644155067,131072 /prefetch:12⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4276 --field-trial-handle=1972,i,1340057910547865659,9894633289644155067,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD547c15630da2a02e47241b4c3852fedbd
SHA19f4ceeb61c0dd0e5968c45566103aacd437c165f
SHA25650050b5837502a25ee787a09ce79d2a7885249d49b895119bb41162526a285d1
SHA5120b54bffcdf8fd5a99899f8ea3f58e39f762ae0c2bce0ad5038d72884f159fabd7d786515e8322987c6794b918847746732071d5b80e24f12aa40940fdf46b7ff
-
Filesize
257KB
MD51360081bf9a2c047ef3bea62038212d1
SHA16e3318e1cbfe42e2e0db79e482bf3af76dc06fe7
SHA256342a459d1b878ba16ae7be617810f016a3293149104624fa6e767bae6e4a04fd
SHA5123426fc388027fdc078e2509ca085e7a23e9c5a5a0226324aac6cb01549ac268e50171cd7290826c38ead66206e2152dbd613f5203120085c354603f2a0e5436b
-
Filesize
257KB
MD565653e4ab198f0335fd9e2f341369ff0
SHA1a76a2dcad45ecd9d85be2f922486620b484218cd
SHA25610890f19901cfd8979b1794c5a5a031ff0e593d527bb4463befdcebb6ebab12b
SHA512f1f33adef2ee57c07ef7ce740a3c2f1d64edb20ee8591357041728e624da160e307afdb737ad98476b5d4237ab5ef23281e9561070a6b424c02a190e069508df
-
Filesize
278KB
MD5b1af7e3a5ece8be46680f54471726fd9
SHA188b713d018c40d824701c15c20718be4cb6cb705
SHA25668205c5eebd22b9b812ab38e11b74defcb6f00f10223964ad7e12cbbe8c7d11e
SHA512c73a6662322cf97da46da8d3e91a8bdaac8916270104f8d207142e393882fd444479480b3c994957ded2901081b01cdae0b031bbe19d8eef639b8bb24efb0dcc
-
Filesize
257KB
MD582e86976a3eeb646545dc45b6155ed03
SHA1a006e20d391339a12088ec74dbfe8962e23b3cc7
SHA25654811b8afb936057edffdd3d181b786238ffe84fd663aec38aa0a2fc293aeec8
SHA512dcc398afa73b57db73e458114dd49c9563bfcbb1bef724de1b63ec796253439fb0a8a75d1dfd4122fda1e778ccf382cd7e067e918fd9dfff52dd177ed17f986e
-
Filesize
91KB
MD51662eaa5fa096c26f488982487c9a313
SHA10e9f795089313db30a18b729b88a026e45571d03
SHA256ac458e4441591bbbce850e5ce9d38e6bdb9d43c444815c188cc23c27eb4c39c5
SHA512564aaf0e15f7ed4b3c7f0a0c183a657ae49864ebe857f2dcfda0a346cc01d2fe583ab0a5e43b38ea7f09b9178dc6f17232d5aeddfcd7836b54b52c7f3afdfc9a
-
Filesize
88KB
MD5ed2bc2685e3b6eb220868f8e6ab06d4a
SHA1c8bea2cfc4cf1eb780b9f308b39c7f77669eb751
SHA256d4f000c6538f8b150d00d146d4b1b565ac30fae14cd3dcd9e8dc85bc3a14289b
SHA512d6812a2bda308a1e3c0a3a4d162689f6a99ebf6c3d936c16eafbf43318656560c82ad1c63553a1f7274701a08699fbe28048e2c959dc6c9576a1a59b0c09c506