Analysis
-
max time kernel
106s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 20:46
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot 2024-06-10 200443.png
Resource
win7-20240508-en
General
-
Target
Screenshot 2024-06-10 200443.png
-
Size
764KB
-
MD5
e3bb8b87097ece860dd5651abee80f6a
-
SHA1
fb5d2461b37503fdeb9b75f37130033dcd091b1c
-
SHA256
7451fdc24c7b1620eb57209fc409c28b59f3996e0e9d32cfd07c4f41e2e40ff0
-
SHA512
6ebe27c84aec751261e12d78feeb2ff05109476a2d7a6e8143a779a0c9ae19a09fb58d1e81113ee89f9c39095bd06fa0eaf170dec8da61699ed81f3d983a9ae9
-
SSDEEP
12288:cWdzgbagzrT2L9dUaoBMrQlhETE2eAorcdNrhT/A4ZN8Xf08t4V:cWdzvon2L9OBMsTETE2mce47M0A4V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 628 chrome.exe 628 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2040 SndVol.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 3040 7zG.exe Token: 35 3040 7zG.exe Token: SeSecurityPrivilege 3040 7zG.exe Token: SeSecurityPrivilege 3040 7zG.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 3040 7zG.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 2040 SndVol.exe 2040 SndVol.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 2040 SndVol.exe 2040 SndVol.exe 2040 SndVol.exe 2040 SndVol.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 628 wrote to memory of 1812 628 chrome.exe 37 PID 628 wrote to memory of 1812 628 chrome.exe 37 PID 628 wrote to memory of 1812 628 chrome.exe 37 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2100 628 chrome.exe 38 PID 628 wrote to memory of 2076 628 chrome.exe 39 PID 628 wrote to memory of 2076 628 chrome.exe 39 PID 628 wrote to memory of 2076 628 chrome.exe 39 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40 PID 628 wrote to memory of 1980 628 chrome.exe 40
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen "C:\Users\Admin\AppData\Local\Temp\Screenshot 2024-06-10 200443.png"1⤵PID:836
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\SubmitCompress\" -ad -an -ai#7zMap12187:88:7zEvent220931⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3040
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2352
-
C:\Windows\System32\BitLockerWizardElev.exe"C:\Windows\System32\BitLockerWizardElev.exe" C:\ T1⤵PID:2232
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5219758,0x7fef5219768,0x7fef52197782⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1344,i,10138950023115357899,2402483702245360023,131072 /prefetch:22⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1344,i,10138950023115357899,2402483702245360023,131072 /prefetch:82⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1628 --field-trial-handle=1344,i,10138950023115357899,2402483702245360023,131072 /prefetch:82⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2276 --field-trial-handle=1344,i,10138950023115357899,2402483702245360023,131072 /prefetch:12⤵PID:332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2284 --field-trial-handle=1344,i,10138950023115357899,2402483702245360023,131072 /prefetch:12⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1104 --field-trial-handle=1344,i,10138950023115357899,2402483702245360023,131072 /prefetch:22⤵PID:348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2244 --field-trial-handle=1344,i,10138950023115357899,2402483702245360023,131072 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3296 --field-trial-handle=1344,i,10138950023115357899,2402483702245360023,131072 /prefetch:82⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3364 --field-trial-handle=1344,i,10138950023115357899,2402483702245360023,131072 /prefetch:12⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2648 --field-trial-handle=1344,i,10138950023115357899,2402483702245360023,131072 /prefetch:12⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3368 --field-trial-handle=1344,i,10138950023115357899,2402483702245360023,131072 /prefetch:12⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2444 --field-trial-handle=1344,i,10138950023115357899,2402483702245360023,131072 /prefetch:12⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3464 --field-trial-handle=1344,i,10138950023115357899,2402483702245360023,131072 /prefetch:12⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1864
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:748
-
C:\Windows\system32\SndVol.exeSndVol.exe -f 45548694 21141⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2040
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:2876
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵PID:2776
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275463 /prefetch:22⤵PID:684
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:406538 /prefetch:22⤵PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\8a5f6715-b0e0-4477-abf7-696ebe09cad1.tmp
Filesize5KB
MD55e828811e7c6a3956b07d114adc3440f
SHA182fd246ebf6270262ef6c7425ce99074a72f399f
SHA2563af6b6c727739542f8c99609d58c601fc282234623829f65eb8bfbdf89454c83
SHA5120c0f455854ecfc879392770827b2d54753b352391c199f5c2e3b7d06c1130879d702cd7bfd7a97d3f450929aee4f4693ca29debd4f39f7fe2130cec824b2bb2b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\99fdbdb4-9227-4d4a-b75e-bcdd761b5eeb.tmp
Filesize5KB
MD5732219999565c5f142e877196df8ea7e
SHA17cd69a7c907758b82af89d5013e818f190b0e931
SHA256258d111553172a746f3d30f6abd7fe263bfb341f66ff28840ceb719e52bbd7b2
SHA512a2a76ab860e024b8e389cedac595554d3cf09e00246c2f67fe137013a9db7a99262104ec0a2a4ccdabb4e775b0f0ff84cfb76fbad49f0882f0221e2ab0c67759
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
16KB
MD5dfb8c132a582542f3f831be950aa7a21
SHA1aaf2615abeaddbcadf22e19bdea21a29be26e07f
SHA2564b9c92249e4567d83450dd06587ed68a2748732e42a80324b3e4c7c73021b874
SHA512813a9f337562d179a9b9fdf533b8f63b25bbe69a602592fa992e433e9b13ec72c97ed30d909ca08e29ec562c6cf436f67c7417639c7017f807adf62d67412794