Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 05:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://info.pendo.io/MTg1LUxRVy0zNzAAAAGTsWO89ENpbu0Vm43RkYO0jaY_yPEt7mPV_WUUDpsOGk0ZJnjG0Ub2geSz4u33ujWqq7xAY6w=
Resource
win10v2004-20240508-en
General
-
Target
https://info.pendo.io/MTg1LUxRVy0zNzAAAAGTsWO89ENpbu0Vm43RkYO0jaY_yPEt7mPV_WUUDpsOGk0ZJnjG0Ub2geSz4u33ujWqq7xAY6w=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133628154249059227" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4228 chrome.exe 4228 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe Token: SeShutdownPrivilege 4564 chrome.exe Token: SeCreatePagefilePrivilege 4564 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe 4564 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4564 wrote to memory of 4412 4564 chrome.exe 81 PID 4564 wrote to memory of 4412 4564 chrome.exe 81 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 3492 4564 chrome.exe 82 PID 4564 wrote to memory of 1968 4564 chrome.exe 83 PID 4564 wrote to memory of 1968 4564 chrome.exe 83 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84 PID 4564 wrote to memory of 3000 4564 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://info.pendo.io/MTg1LUxRVy0zNzAAAAGTsWO89ENpbu0Vm43RkYO0jaY_yPEt7mPV_WUUDpsOGk0ZJnjG0Ub2geSz4u33ujWqq7xAY6w=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcaaf0ab58,0x7ffcaaf0ab68,0x7ffcaaf0ab782⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1852,i,535225659688472419,6535378157845489924,131072 /prefetch:22⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1852,i,535225659688472419,6535378157845489924,131072 /prefetch:82⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2164 --field-trial-handle=1852,i,535225659688472419,6535378157845489924,131072 /prefetch:82⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1852,i,535225659688472419,6535378157845489924,131072 /prefetch:12⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1852,i,535225659688472419,6535378157845489924,131072 /prefetch:12⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4360 --field-trial-handle=1852,i,535225659688472419,6535378157845489924,131072 /prefetch:82⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1852,i,535225659688472419,6535378157845489924,131072 /prefetch:82⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4492 --field-trial-handle=1852,i,535225659688472419,6535378157845489924,131072 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4368 --field-trial-handle=1852,i,535225659688472419,6535378157845489924,131072 /prefetch:12⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 --field-trial-handle=1852,i,535225659688472419,6535378157845489924,131072 /prefetch:82⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 --field-trial-handle=1852,i,535225659688472419,6535378157845489924,131072 /prefetch:82⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4404 --field-trial-handle=1852,i,535225659688472419,6535378157845489924,131072 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3912 --field-trial-handle=1852,i,535225659688472419,6535378157845489924,131072 /prefetch:12⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4160 --field-trial-handle=1852,i,535225659688472419,6535378157845489924,131072 /prefetch:12⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 --field-trial-handle=1852,i,535225659688472419,6535378157845489924,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4688 --field-trial-handle=1852,i,535225659688472419,6535378157845489924,131072 /prefetch:12⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5dc0bcdfec3a074fca012317d3299c28d
SHA10bae5bd1818e615027cc5da1b3b351e48d62353f
SHA256976cffa4571b2f4b1b3f1d6b9fed5347d6ee03ffdc1a0c1e8cec423e3f059795
SHA512e7aae304a97f34f3171e923d4c3cf26eeb9ef5e1781b9c9f54fca95daa72c505de4176025bd2f45a31d085220dc751136fd7e1e59cd9c963ad8250288f1623fd
-
Filesize
257KB
MD5e4e1223fe99de1144822e7772838c2ee
SHA1d39922954fb44da697a54eb264814eff2038db98
SHA256c2544237f08a0946acb447f5c3a30767858940fecdcee687c4f2e6c906dd365b
SHA512e14bfcf8ed7237098c6f7795bece8fc6904b93d4685904abeadd131f211035476d8de2d0d2adaefb87b20339835dfdcd50da151055e4b5a609a83c7afdc1628e
-
Filesize
257KB
MD5b0a9d22cc64624218b804540f45e97fb
SHA146a9b7d635cada53f2844551d781317cd07b68b7
SHA2560d35fdb358b29714a12e9571a1f6906f593484cefb5db5d105be137da85d95d9
SHA512f71736d8d8995741c195a0f454b3f39a5cbac0501ddc029cdb17dbdf836d3a00f2a8e2bdc3f466724a27b76e301b80d7353ef42b1330277f72ea720e94e4782a
-
Filesize
91KB
MD52e5ac691625f1e14cf34f9cad0456a71
SHA1982ce46a1ba06de05af9cfeb4b66c34dc947367a
SHA256fc4d9f34202a301cf5aa9277ca08bafee29bd411e7a1061ba6dd3bae984848ed
SHA512496223c7cbb9e64338cd33846f6b9a7048ecf3065b9ba797216423f05ee64e6ac534ba32dd7f22a3a606b2a3e3bf0a18f7d68365fc925856743b8a5eeaa81635
-
Filesize
88KB
MD589de0f2ee6b80ce60ad08ba0f69ee9f4
SHA179aae739b40defbad4c617cb2e960bda3c158070
SHA2568542510c653d06945358ca33abf853df6c7ac52267fd4ad4c71ad47cab9b6629
SHA512963c42e0a09f299153b47aeb401be4e4649a6c0ba71e6d31f1bbfc57a7e20a355d94915541691032078c1df03c710e9a2ac7f61e97abe77b61a1d9e3e227989d