Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
73s -
max time network
68s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
22/05/2024, 14:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://axarnets.co.in/
Resource
win11-20240426-en
General
-
Target
https://axarnets.co.in/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608605547443771" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2088 chrome.exe 2088 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2088 wrote to memory of 4992 2088 chrome.exe 80 PID 2088 wrote to memory of 4992 2088 chrome.exe 80 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 3132 2088 chrome.exe 82 PID 2088 wrote to memory of 1200 2088 chrome.exe 83 PID 2088 wrote to memory of 1200 2088 chrome.exe 83 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84 PID 2088 wrote to memory of 1632 2088 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://axarnets.co.in/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffeccd0ab58,0x7ffeccd0ab68,0x7ffeccd0ab782⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1488 --field-trial-handle=1800,i,13363016933121509655,3919081914444189277,131072 /prefetch:22⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1800,i,13363016933121509655,3919081914444189277,131072 /prefetch:82⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2128 --field-trial-handle=1800,i,13363016933121509655,3919081914444189277,131072 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2828 --field-trial-handle=1800,i,13363016933121509655,3919081914444189277,131072 /prefetch:12⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2836 --field-trial-handle=1800,i,13363016933121509655,3919081914444189277,131072 /prefetch:12⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4244 --field-trial-handle=1800,i,13363016933121509655,3919081914444189277,131072 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3280 --field-trial-handle=1800,i,13363016933121509655,3919081914444189277,131072 /prefetch:12⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4432 --field-trial-handle=1800,i,13363016933121509655,3919081914444189277,131072 /prefetch:12⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4236 --field-trial-handle=1800,i,13363016933121509655,3919081914444189277,131072 /prefetch:82⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1800,i,13363016933121509655,3919081914444189277,131072 /prefetch:82⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4300 --field-trial-handle=1800,i,13363016933121509655,3919081914444189277,131072 /prefetch:12⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4468 --field-trial-handle=1800,i,13363016933121509655,3919081914444189277,131072 /prefetch:12⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4560 --field-trial-handle=1800,i,13363016933121509655,3919081914444189277,131072 /prefetch:12⤵PID:260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 --field-trial-handle=1800,i,13363016933121509655,3919081914444189277,131072 /prefetch:82⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD53f55268804adcbffa7e69a3bf0a06f88
SHA16d65d4b08dd4b38b9a2cb66bcde873502e56f0c6
SHA25606c2837c2f4cca602e6e8bda0e60cb6257093777ca15b2aecc5fb512f4b5de22
SHA512c468cd483fe7f5f03ee98cdf6dee2df3b9fb212056ead68abddda312d62533772767d6b67186b06d4ecda03bdff9a4d657e7307023df9adac3151b1b02e8a54c
-
Filesize
2KB
MD54e44fd67b3b4e17b0c6386f119ae7079
SHA1b21628279724af8233d9be9078a0e78192d6b192
SHA256ae2d23aa26f6e3a1ba7ae6521e2dde60c6217544081493992b326e662b3bf7fd
SHA512d12a7d806d6824cd7a8c6d5847fcc2a95898c064b5e50c5e2cb6e6cb35507abdd06bff3360261833dbbed7e75a5b2ec6e8e96e53780ca4d1b35866b5499b2902
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD56ad04da662b33deaf835e9cc261a1223
SHA15f296b234a346d5706f5bbcd8eee3a803d81cd27
SHA2562e762b5edba0212c1822f5aa5f521fd880899f38a07fe98e3970d5f55266e5bc
SHA512330a98685bc2d1bcb434fc5fcf806f9c6b724e666a783115a8e21b7dda657f92cf17bae42080568c3531b6b8d93908fcf51b037fbb1813320d08ec1d911ca520
-
Filesize
1KB
MD5584f8c227d58a3deed82b85422158d7e
SHA184e0e4f3e5d0fe5ad651ee6d03b395f61e4516c6
SHA2562e20e1cab7eead0146c9aec22db00481fe51a526c61f7cdb05ca50fec7815130
SHA5126447f306c0eaed1ee04b9000891e029ed183aac15d7556d05c644bc9f45871e06b5ce1402078066e681eba8c31b62930570e0da083c82ecd61ebb5d2f12d81cd
-
Filesize
7KB
MD5de31781efdbfaaad46bfce3ff900ca54
SHA17b4c758bf24748a34f24ad72a56c2cbadec4aa78
SHA256256cb8b816925085472b388d2dd5538793d697194fb821d8b7238818280736de
SHA512e219973b702335981c7498896a13b8297ac5eb1bd86d3bdc5d50fa671dab7b3c443b5f0d6ec204e1093ace5f63f02213d3470c42892808a12913603a711ab53a
-
Filesize
7KB
MD51afa4b4730c35a9efcdca985e7699b8a
SHA1d84634e89412384ad68bf72358cb1d7bbe8275b2
SHA25605ee80e6e129074187b618710f65d55d8db5de9729e24b1152ccf5f699c2d16e
SHA512155e223b043a9f2050d4c917b789211c51ee78f48fb3c0d3fc159efaf4dd2e845b2591917802cf45a466f11530cdf79b47a384852bf96d29d63281bc2567c52d
-
Filesize
130KB
MD5df34d8edd1c91da50ae3e1c1a627ae94
SHA1057e13a432f732535be9b6a3cc3766084bf30832
SHA256a7a0688fd170c9c40bfb28fdeee0856f1212d3da69b4bd56408ba48ba5f3ce3f
SHA51213041918ab9e9a4fc2688d174b1f420cd93e13b9ff98e7fd9275ff4be878502a7b9ceb08f8367f1a75b317eaaa29f8fcfba59e2281c6c8098ff988778cea5cd6
-
Filesize
85KB
MD59cd16bcee74fa71e7d2bc7d6594b5804
SHA1c57fc6bcdcd0697ab11400e535642f3e79a44318
SHA256ef06134bceb8dbcedc405bd56bac382b254b6ef98c15bf1affe6adfb106997fe
SHA5122a5a12700db9742f54e73b48b24fed3615a3f516b4651b3b5121501d06d3b495e47dff0edb263afd00c061d3e1a46bbba1c336980be07db97c13c1ea6ca3d628
-
Filesize
83KB
MD51d13e27782b62c3c0dce7e2ba80cc523
SHA193851f43cd925c72b5d2b45455f27c9329421200
SHA25662cf701b3b8ef94fbd931ff5195b7ef9d183b8b4080cf41027b9791fb1f8ee1f
SHA512ed4d4f285d9a8836aef0f0621acf230012a1a7ae3b3c27ce7ccf9df9c444aed9b3f0ea9b86c49280d0e4234d80ee97f758214c9712b3250d1354dcbf39e95529
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84