Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 15:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://7-zip.org/a/7z2407-x64.exe
Resource
win10v2004-20240508-en
General
-
Target
http://7-zip.org/a/7z2407-x64.exe
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1488 7z2407-x64.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133638015288822838" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4684 chrome.exe 4684 chrome.exe 4892 chrome.exe 4892 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4684 chrome.exe 4684 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe Token: SeShutdownPrivilege 4684 chrome.exe Token: SeCreatePagefilePrivilege 4684 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe 4684 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1488 7z2407-x64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4684 wrote to memory of 3432 4684 chrome.exe 80 PID 4684 wrote to memory of 3432 4684 chrome.exe 80 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 1208 4684 chrome.exe 81 PID 4684 wrote to memory of 2296 4684 chrome.exe 82 PID 4684 wrote to memory of 2296 4684 chrome.exe 82 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83 PID 4684 wrote to memory of 696 4684 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://7-zip.org/a/7z2407-x64.exe1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff9cafab58,0x7fff9cafab68,0x7fff9cafab782⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:22⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:82⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2176 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:82⤵PID:696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:12⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:12⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4672 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:82⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4712 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:82⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:82⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:82⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4832 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:82⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4124 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:82⤵PID:4004
-
-
C:\Users\Admin\Downloads\7z2407-x64.exe"C:\Users\Admin\Downloads\7z2407-x64.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4260 --field-trial-handle=1688,i,11836699411068225758,9164961895221998582,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e1b45de586a8cc1a9c7852dc4bc4626e
SHA11424c37b6d2a0819981a3b39c78f71e6a089e4af
SHA2565c8914993fb872f40019b01dda72d6e4e935a71d834678348e5c550fbb13f585
SHA5120697e208352483d8903a2ac25709ea63735ae31478625dd0e092346a764cb1212fe74ca53507fac25f4e7f80d7b680870a847700dfb6b944b763a662b4ce9f58
-
Filesize
1KB
MD57c3de475b4478b3225e607413266d5b9
SHA18ac33aaa991913c97fd653eb8d53a59741cc165d
SHA25653055d5d703649254bb0f05e0992a8bedc7950fc89b76d5ed6d7c1b6abb3d533
SHA512e01a1326f9340dab09b7be1f55a9c57e1d9687cb1aada514a5c6b050de3737282bdfa181585a01de5aa10f22083eff0e42b7b25cd8576af23575cb6709cda745
-
Filesize
1KB
MD51d57a07f401abc54df14db9d5165ac56
SHA1a08e378b3781ce50f922873d1a5b35e06704ccc7
SHA256f6d7718683c000192327bb3eb2fbbd2deb25642ab4028002703f1e07112f0aa8
SHA512a4a4839e678a3b8f42eafb5d49821123263b9eb423e2ce9e4f38b5b9be8d5bc32eb8d6d4d4bb998294d2510264c7563e5d538012a8cfc4f3161b2cb3a79e03fe
-
Filesize
1KB
MD59327476b66b3636506f9acf08b05a44e
SHA1dd7346102a9fe41ab4d574a749e68f84af18f4d4
SHA256dd2ef0893960462314f637bd5f8de2e0f5ffb36491253b1586b821d814170681
SHA512d826e8d6669b9ec9d89c60fef2ce034d6b094b492862ee4b820c97ed02545aa5265ccb622c4bd60561b442883471e6e945455e83a99886ec8c72e0115226457f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
523B
MD55ec5d3ef9b9fcfd572779cdeb090bed0
SHA1ac8a0e43e40cb70346925e0063010d59bb4ccc3b
SHA2567e302b652dca21b5649f96e5271b85e992667822acd898bd8ec448a859ec4546
SHA5127a9029522a41d9c97c2d2ee8c4a2d4e67cd1ba7f61377b8d1677b4bf51b0071403dc5c781fae5226d5248fa708087a88c15891746b8f5f5b5c146a5dcd85404e
-
Filesize
7KB
MD59ef18283c58453e8665f9b3ade7c30bc
SHA193829c2dad43996f5276638a7b3f6eabd3c554a9
SHA2564e290eee86aa35bdbee2241ba6a20c05e30403038aab51016cafc010de6266b8
SHA5128b43dd07f9e31a3a0a87e46f3d4c26eb1430c6471cdb9294b1a2f3d0950253e4c53cc640cb4ddea4c04a2aad9c36fe265696d2d088bab71cf13b50b2c38c5fa6
-
Filesize
129KB
MD5f041fdec38789c9e4439a7faae00fa60
SHA1db8eb4ebe16f56563c77fb066788ed186adaa7f8
SHA25653a505ca350360500f2c5d3f4fdcc2bf0bdf67e9aa83b1c3e05ed805ae37593f
SHA5128ad0b9a4db85a32c27ec369a70d883e1019a619e84c123498165d6c4ae4056ecc894c961aaef07dc3c2e12aea51e12bba570371355396ab770a8722eae98d3c5
-
Filesize
1.5MB
MD5f1320bd826092e99fcec85cc96a29791
SHA1c0fa3b83cf9f9ec5e584fbca4a0afa9a9faa13ed
SHA256ad12cec3a3957ff73a689e0d65a05b6328c80fd76336a1b1a6285335f8dab1ba
SHA512c6ba7770de0302dd90b04393a47dd7d80a0de26fab0bc11e147bf356e3e54ec69ba78e3df05f4f8718ba08ccaefbd6ea0409857973af3b6b57d271762685823a