Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 17:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://w46.katexpe.com/62008910670776977498kldxgkvvmxcezvctyzutfbm?IJXTSYYPOZTUUTVGRTJBVILSHLVAVLZADAAZFTCO
Resource
win10v2004-20240508-en
General
-
Target
https://w46.katexpe.com/62008910670776977498kldxgkvvmxcezvctyzutfbm?IJXTSYYPOZTUUTVGRTJBVILSHLVAVLZADAAZFTCO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133614788472786884" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2968 chrome.exe 2968 chrome.exe 1636 chrome.exe 1636 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe Token: SeShutdownPrivilege 2968 chrome.exe Token: SeCreatePagefilePrivilege 2968 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe 2968 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2932 2968 chrome.exe 90 PID 2968 wrote to memory of 2932 2968 chrome.exe 90 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 1596 2968 chrome.exe 91 PID 2968 wrote to memory of 5108 2968 chrome.exe 92 PID 2968 wrote to memory of 5108 2968 chrome.exe 92 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93 PID 2968 wrote to memory of 4272 2968 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://w46.katexpe.com/62008910670776977498kldxgkvvmxcezvctyzutfbm?IJXTSYYPOZTUUTVGRTJBVILSHLVAVLZADAAZFTCO1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff530aab58,0x7fff530aab68,0x7fff530aab782⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 --field-trial-handle=1880,i,8697446255629377886,12195659939012542870,131072 /prefetch:22⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1880,i,8697446255629377886,12195659939012542870,131072 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2224 --field-trial-handle=1880,i,8697446255629377886,12195659939012542870,131072 /prefetch:82⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1880,i,8697446255629377886,12195659939012542870,131072 /prefetch:12⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=1880,i,8697446255629377886,12195659939012542870,131072 /prefetch:12⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4312 --field-trial-handle=1880,i,8697446255629377886,12195659939012542870,131072 /prefetch:12⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3272 --field-trial-handle=1880,i,8697446255629377886,12195659939012542870,131072 /prefetch:82⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3352 --field-trial-handle=1880,i,8697446255629377886,12195659939012542870,131072 /prefetch:82⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4132 --field-trial-handle=1880,i,8697446255629377886,12195659939012542870,131072 /prefetch:12⤵PID:5488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4812 --field-trial-handle=1880,i,8697446255629377886,12195659939012542870,131072 /prefetch:12⤵PID:5568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4236 --field-trial-handle=1880,i,8697446255629377886,12195659939012542870,131072 /prefetch:12⤵PID:5660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5016 --field-trial-handle=1880,i,8697446255629377886,12195659939012542870,131072 /prefetch:12⤵PID:5788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4812 --field-trial-handle=1880,i,8697446255629377886,12195659939012542870,131072 /prefetch:12⤵PID:5856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4696 --field-trial-handle=1880,i,8697446255629377886,12195659939012542870,131072 /prefetch:12⤵PID:5968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3568 --field-trial-handle=1880,i,8697446255629377886,12195659939012542870,131072 /prefetch:12⤵PID:6012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4560 --field-trial-handle=1880,i,8697446255629377886,12195659939012542870,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1528
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3704,i,14221647728265121051,6840906015709541562,262144 --variations-seed-version --mojo-platform-channel-handle=3764 /prefetch:81⤵PID:4224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e10dff9403a18e49301f9fcd2dbea3f2
SHA1241f6346606f62b85e95a923e6e64a2fde93d3fe
SHA25614f79049a64c3deecac8de26e086e784c7607c71275b5e5b4df4fc6f71becbe9
SHA512552d9671d4450cc0149edacdf3810661520d0d4203a76f67966edfe332f5da1e4cc745fa9b79623146e5fccf3db408aaefd027f2e1781b7d4f4340caa96f76a2
-
Filesize
2KB
MD50bba9811d3ebbda59d1519155eecb53b
SHA1e033500818850d276ae7f88aa46a340ba2ce7ac3
SHA2561c908ecfbb70092698ae7d9e7daebbcc0515cc80b170163a93276d077b5539c9
SHA5125b452d3b3e891064cb124ca47beac6271bfdd0e5ce86a328ebb339fdf4e1ca6e530fb2ea92292e2aa99db30051063876610867f8f8a2a44c646e191fd1db7507
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5e2083b334bc5f3cf7b21709fb9e71358
SHA1e55d841d7ad2555284e1958e294cf495cb9715d7
SHA2560270c971cd665108428dd23f104448faf2d7228d4181a8a5e5632768707b10bb
SHA512dfbb99258407d177c2e8af1a46da88ce4135def9a18880753f1113e180b60173e09cc72d747b3cde1e90d1f263589b47e90a93bb12a6fba97558d2a01f8eaea0
-
Filesize
255KB
MD54aa9b599bfacd24c8b99a060326b4f64
SHA15aa203f6776dd231b05c41b4bd08e40cd11c8b1a
SHA2565de413e8049139214eb6c327bb79ac9f6781d033ec144b472ac57c049865d50e
SHA512a3cc9a586200489a92ad1b409ac6e1e9da2f7e2d3b22b1f459cfd1951892e783f6f096273316251816fdb26d8d8b2d230e908223be969fbceed29ff6f00cc99f