Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 18:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://landingatsaddlerock.com/
Resource
win10v2004-20240508-en
General
-
Target
http://landingatsaddlerock.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133613962593687606" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 1028 chrome.exe 1028 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeCreatePagefilePrivilege 2928 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1496 2928 chrome.exe 81 PID 2928 wrote to memory of 1496 2928 chrome.exe 81 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 2560 2928 chrome.exe 82 PID 2928 wrote to memory of 3096 2928 chrome.exe 83 PID 2928 wrote to memory of 3096 2928 chrome.exe 83 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84 PID 2928 wrote to memory of 4292 2928 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://landingatsaddlerock.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ff8c0a6ab58,0x7ff8c0a6ab68,0x7ff8c0a6ab782⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1960,i,1010624718892188419,8635196918842007945,131072 /prefetch:22⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1960,i,1010624718892188419,8635196918842007945,131072 /prefetch:82⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2296 --field-trial-handle=1960,i,1010624718892188419,8635196918842007945,131072 /prefetch:82⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2800 --field-trial-handle=1960,i,1010624718892188419,8635196918842007945,131072 /prefetch:12⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2808 --field-trial-handle=1960,i,1010624718892188419,8635196918842007945,131072 /prefetch:12⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4072 --field-trial-handle=1960,i,1010624718892188419,8635196918842007945,131072 /prefetch:12⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 --field-trial-handle=1960,i,1010624718892188419,8635196918842007945,131072 /prefetch:82⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4424 --field-trial-handle=1960,i,1010624718892188419,8635196918842007945,131072 /prefetch:82⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3720 --field-trial-handle=1960,i,1010624718892188419,8635196918842007945,131072 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 --field-trial-handle=1960,i,1010624718892188419,8635196918842007945,131072 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1960,i,1010624718892188419,8635196918842007945,131072 /prefetch:82⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1876 --field-trial-handle=1960,i,1010624718892188419,8635196918842007945,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD53e1c00db00afa53d8d86c99ad7ee4909
SHA15e4e095d38dc23b846f1e2bc0f59861143efca19
SHA256071f316d46db791fad787233dc83976f2b2d030528a5c1e4cb616e4720bf1be2
SHA512d7e655254ec38d04f19d28eaf1d3581c08f78eda2c85666a378a6f53536dc82a0b6aa55f96332282ec45f37c343b02551d0bdf4597f470d70f9dea958a206eb0
-
Filesize
3KB
MD58150cc121f8476ec6c44329aee505187
SHA1f101e103d025e4dee2ba58481cf10528e0f25973
SHA256471fd082c2cf7025ab2ae5ed8fd46f0cf06e696a4b77829c73f1862b24de7b2d
SHA5126f4aa580a0e85b8600b48f840aa9343edd6733998da22f808a4f34c1498d3ff830100c6ef37e4e51a109e80237910c8da5f1fa4b0d964fd6e6fdcd73a6803e08
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5ec6165b6971ec4872d7b31816abf6bb1
SHA19e690bb357b341dc6bcfbdc7364d97af58dafe39
SHA256b2173e1477ecd1da98b7841c6291099efe9ca24a6cbc26ce0bb5a84cd2e78c1e
SHA512eac419796a9b1302b8e94d371fbe7bc9ba2250e675fa6e37ad476bb7b25c0ca7d32422a58ecdb674cc64f8995a53264d0f3518bed53a1fc6591ffac56d423567
-
Filesize
7KB
MD5973312d4d90fde913647707896d7ed82
SHA1cae9be9cd25d18620e6e9bb78453599ddb792f11
SHA25610bd3219faee184e05c2d2964008b5f91e7a30c4d1f7bed36a1509169e445714
SHA512802316c4f812b2156ece5f9c7d52c457135c06e33f438bb37ced90dc9836b671af10294ca6c9fed1015e847967334748fb01b23a206729f6e76a38f1862ee296
-
Filesize
7KB
MD50f804d0626840d577af77a6ae1759eca
SHA15749de948570fd500b853680c9141db8dc6e925b
SHA256ecac1a68565ed00c3c66d6d8408d6720d01b30edafa65c9ac9a08afbc0523792
SHA512b07b59d9aeb2dc9f7c6f64b51ba588bf105028cf7b795be4e2330413300ba6bd39eac44ea88a9f104e99433aa93e172d3b1f9963bbe4d63e2154ec767607f4c5
-
Filesize
257KB
MD5adad1a2a59f91da30ef75cb9cdcc9967
SHA10d147f4943c583d9a877a42561792ae87b81da2b
SHA25667375d506b07becab989ce862ab5cfee9b1c224abecb30ed8373f15ad812223b
SHA512b220c6dfa17996f550204d5040ebd87f351797ae8720dbf63896cd6f7885e09c7764107f1591000fc8c6d39bd31dd93368bae303ac6ef138739afeab5a84b456
-
Filesize
257KB
MD5bf7d518afca1be50a7f9c3779c458958
SHA1808b50c3011cf93d258b5bbecfb6b6d27b646899
SHA25694c6ecee95df23609fbaecf6724c982f48858ec7adc585f282e41a5264720435
SHA5120143a071bd03e33d48bbf8928e6c325d549c7695f2b5c5c47d859bd70a3483448dea7202c16ec3b18d61e48d7c461334b6ff14678d46dd02dc01fe134e967417
-
Filesize
257KB
MD53b1ae76f3a36fca85a8f95858a6c704e
SHA167075eda42f1e71cdf290192035636c1ea9ab095
SHA25692665d6bb7be39dc56b6b5fa4a48428ea90fe77555e90a40d7c2e11807d211ed
SHA51227f31f2f7ba753ede961a8c7287858e5c1c0eaba1f26b8fb715d82936ca66ff20c4b14d566a6add401892e9481c3de250b54c6d1fd299b33f7cfa71939b38e68
-
Filesize
91KB
MD5fc735a1677838940e173bef67518853a
SHA1124f8dac976befa3a9428b45dcc0e1d0e2c68ffd
SHA256712f3ef9979e619001d74a984c58c92dc24b63c72ab7322666cf9578d4518dbd
SHA512549b79c9d9a605ec41eafe96d13715da2e1e6e4e478fa95e5bb24cf888352a07f9d9d173e8edc1c2f88571278936bff71fa95304cdac98e933c2eb65c4244a92
-
Filesize
88KB
MD5f8f99ea37ad6aa4f50ac2e859ca9f785
SHA1c2c658d804806be4c4e6b9165a5cceab989d065d
SHA256d673cd064e7e4bdfb9f94444403fa8d390dc6d1a5b8b64449dccb707c7032eb8
SHA512b1af15d1e41f28f6a36de322f997b974195be4e8ee1082c75664ae9523eda2d5dd8f42e54c4213ae6f6eb0b6a27616875fd14a0e10eb1cdc60d0d0118deeffdd