Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1200s -
max time network
1175s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 21:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://membershipworks.org/file?mid=66422e2a98a3b4aa0b065de4&fnm=ParkingDirections+to+Imperial+Ballroom.pdf
Resource
win10v2004-20240426-en
General
-
Target
https://membershipworks.org/file?mid=66422e2a98a3b4aa0b065de4&fnm=ParkingDirections+to+Imperial+Ballroom.pdf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133601978091706835" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1768 chrome.exe 1768 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1632 chrome.exe 1632 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe Token: SeShutdownPrivilege 1632 chrome.exe Token: SeCreatePagefilePrivilege 1632 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe 1632 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1632 wrote to memory of 4656 1632 chrome.exe 84 PID 1632 wrote to memory of 4656 1632 chrome.exe 84 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3384 1632 chrome.exe 85 PID 1632 wrote to memory of 3964 1632 chrome.exe 86 PID 1632 wrote to memory of 3964 1632 chrome.exe 86 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87 PID 1632 wrote to memory of 1152 1632 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://membershipworks.org/file?mid=66422e2a98a3b4aa0b065de4&fnm=ParkingDirections+to+Imperial+Ballroom.pdf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1b97ab58,0x7fff1b97ab68,0x7fff1b97ab782⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:22⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:82⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:82⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:12⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3088 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:12⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:82⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:82⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:82⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:82⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:82⤵PID:1884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:82⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2488 --field-trial-handle=1920,i,11458669682667985049,12485195430675465936,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD597a3017b6490b95d69b88016ea151675
SHA14c313a1d826556cc02ee25dcbcab27f0fa9e3a44
SHA2568b91e561da9da210182a27609ca45a015b059d1a1063c5bb3e0e3359cf52e32a
SHA512db37e0e3c1e56cf243fe641e0903ef84cb82ba93b5c611dde137655dbb5917807cdf061435ad10c5b24c24c42b41cb2e4bd4c7d3a9d84e50370bf36914f44f36
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5180fbd5f1b6a3fd1c26cb39f26336241
SHA1546b8aad4aca368cb5c436f17c3038fff415b76e
SHA2561bed636a83de5b4011b3662a7d7b7be71c514165d8d1eefa8ee1f274271bff7f
SHA51290c9b3336d8d73ba18ffbf0c788854b281801d6f564f507518d89710370699bea63c4bd4a0657cfe6040c06e34f9a441ecce8b88d733f76b7473505dca3aa19c
-
Filesize
132KB
MD5d7ca29d148e697908f921ecec6b7012f
SHA14a02f2bc6332e517b78ddc57bfd4591cb96db089
SHA256bc849c91c9e23c63978783bec52aa67ef6b4d21dd4e47516f2e8d28bc0c4cad1
SHA51256a12dcbb3e380820c1e79c6da6ffc3467139d40b11ec5aad14ce63d93ce96a3bf3eb12ef518926cee3d8eb4755cd0bb32ab36e3170a669b0b91e976bc0363f2
-
Filesize
131KB
MD580936ace56bd37b9f39b5f747136d90c
SHA1acb84dbdf92933bf3d06a7c2bfc70b9707002d77
SHA256b397fb3e85f21ebc5497212a39acfa70cafda73522aebeac1f7fcf062f49de45
SHA51272bf2e66ba8b9dc177276802008263e25fa503059c7db487e5f08d371762a934b9e4dd6bb825d3b5f015e567adbe634fe455d82e1d939d6ff328fd14a6afa567
-
Filesize
131KB
MD5e543dc047c70f5cadc095453074f3e79
SHA18219b758318466898f48a0630694453a144be646
SHA256ff68f659f944e7333c0f08f2c32c75c4776646063f38c2a2ff779979ca9cdfc8
SHA512efe4eb4fa67524059e801b0dbfed4dd879425e9a76bcb3d73f3e1fc7a678ca5664e953576423bcbdff62dbc6a1627b21a13088f73db138c973f8036d0f5cd465
-
Filesize
176KB
MD5a06bceba5b22ff8550bbfa30bf5a8870
SHA1a68f2d9d6a70e315ba653ba806485a25432363e7
SHA2563df7dedcc24e88c9acacf407f6a2ac6630615310ab67455c558dc343de54df6c
SHA512e646f6f17792f05e1e1398e448e5069178f4fcd1b4fd313bda8ccedc0763021938e2942055c9a33b9a4cd47a03c59ca8981a979e02b381266706125ec81b73ac
-
Filesize
97KB
MD5d482bf7b2e43000bccb7fb046c8c71ff
SHA1b158e4ee0d4ec7f3d28f954d4326e544cc3e1acb
SHA25621b4ba26cebb11aa8ee4e9749724b6766d79dc692728445e8ed9f995272d6100
SHA5122fc4ab368124b56242e0a6712a8e765c65895310726d19258d687036ee6add0ef7391e469ed91e07547e1f2aa57ee661b6a92587d8ee4a51935f1967477cf8dd
-
Filesize
94KB
MD50841be8860b6fc94949797a0a845c008
SHA1f56d78b6f097dc5aebb4b751f423031792ce7f2c
SHA2562bad29ecf70249477eeeb48f3f9d60837e92d209bfcb58641e2aee8f9e9034d2
SHA5122a7564d74cf18482f150ddcc49fdbf60500f45c99b0545dcc106710c01482db2537e5288ec8fbeb496a1fc6706cccf7733102712ec6e189a2b921e439de35636
-
Filesize
166KB
MD5504f35d6f746273756883095c3b774f1
SHA13ef435fc797eaaeb1fa3610e817c916b323ecfe4
SHA25629a190d0f62a80c9815e85cceca26687e840f6f063722e2bee7ab27167e66d8c
SHA512a92d368284e8c97549bf8f502d08777533f96ba4ee718badb8410877cad86072c59b9c48012361fe3723df65057b1589aefc5f0bf6608e7e81e0f97d5d5689db