Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 00:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/presentation/d/e/2PACX-1vTVezlhtFj2boHC4w6MSgib0D8felDs3onG6kkQHBWgRzK6NLebTXkYK0LU5UzkjDAAfNTT3rup2qmo/pub
Resource
win10v2004-20240508-en
General
-
Target
https://docs.google.com/presentation/d/e/2PACX-1vTVezlhtFj2boHC4w6MSgib0D8felDs3onG6kkQHBWgRzK6NLebTXkYK0LU5UzkjDAAfNTT3rup2qmo/pub
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133648716729345627" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 3552 chrome.exe 3552 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe Token: SeShutdownPrivilege 4600 chrome.exe Token: SeCreatePagefilePrivilege 4600 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe 4600 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4600 wrote to memory of 1512 4600 chrome.exe 81 PID 4600 wrote to memory of 1512 4600 chrome.exe 81 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 2436 4600 chrome.exe 82 PID 4600 wrote to memory of 3848 4600 chrome.exe 83 PID 4600 wrote to memory of 3848 4600 chrome.exe 83 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84 PID 4600 wrote to memory of 3116 4600 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://docs.google.com/presentation/d/e/2PACX-1vTVezlhtFj2boHC4w6MSgib0D8felDs3onG6kkQHBWgRzK6NLebTXkYK0LU5UzkjDAAfNTT3rup2qmo/pub1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffc4511ab58,0x7ffc4511ab68,0x7ffc4511ab782⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1860 --field-trial-handle=1848,i,7157079516256821537,18051588318306724665,131072 /prefetch:22⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1848,i,7157079516256821537,18051588318306724665,131072 /prefetch:82⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1848,i,7157079516256821537,18051588318306724665,131072 /prefetch:82⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1848,i,7157079516256821537,18051588318306724665,131072 /prefetch:12⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1848,i,7157079516256821537,18051588318306724665,131072 /prefetch:12⤵PID:1328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4372 --field-trial-handle=1848,i,7157079516256821537,18051588318306724665,131072 /prefetch:82⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4532 --field-trial-handle=1848,i,7157079516256821537,18051588318306724665,131072 /prefetch:82⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4584 --field-trial-handle=1848,i,7157079516256821537,18051588318306724665,131072 /prefetch:12⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3452 --field-trial-handle=1848,i,7157079516256821537,18051588318306724665,131072 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1848,i,7157079516256821537,18051588318306724665,131072 /prefetch:82⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4660 --field-trial-handle=1848,i,7157079516256821537,18051588318306724665,131072 /prefetch:82⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4596 --field-trial-handle=1848,i,7157079516256821537,18051588318306724665,131072 /prefetch:82⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4584 --field-trial-handle=1848,i,7157079516256821537,18051588318306724665,131072 /prefetch:12⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1608 --field-trial-handle=1848,i,7157079516256821537,18051588318306724665,131072 /prefetch:12⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2800 --field-trial-handle=1848,i,7157079516256821537,18051588318306724665,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4552 --field-trial-handle=1848,i,7157079516256821537,18051588318306724665,131072 /prefetch:12⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD510bdb24d07c207842dd753fcf4f7f482
SHA121d78607e9c1117f178ab577555f7666b07ecb96
SHA256f34a38cfa8755fee8ed157e81b01783d3dbdeedd7de40dff9ebdddcf39ab442f
SHA512ad2a5b0fad3415bfd0fcd68936b15815dbb52e560027d9f699487971723793d21f737c35fdb4076344826a0b30f86e25feeed325920b78e163d3c6800d01b4c5
-
Filesize
257KB
MD51abd152269d03db802b51fba2aa4c7e1
SHA1833fdadf3e988ccf5d99e751656ec8c8713e17ae
SHA256fda31c4136023832d23f2c8d2fa55451a35d2050b4b92078ff8029d766a02e0b
SHA51265d0e7ef7d294a883614a4a19e5516ed7be95977607238837c95f93f45f88b9abad34970916b99c95fdd11c058202d04f5fe2dff3a253c4a7c4ae7bcfac7fe95
-
Filesize
257KB
MD51e97b37c1f458e092ac9b1182cf0b04f
SHA17032cba97a729588e46bfff6320f86f5ccd760b1
SHA256be05e4e743fab57d97f70bd9662a4e786db6ce35dd8cc0c810b634a9bd6eec7b
SHA5127505952e05ed4e42ab170068768b808a0bab1508078827715620e6560481dcb405ef34cb57eafe9025e4fdc67b638b6834f5fe6f08f54412a9502010b95e01ba
-
Filesize
91KB
MD586826db3df43b8caf41e50e346823f7a
SHA14a1da283a406b0d1bb1829f660161f4e30930385
SHA2561551a83da307a092f6d37a40b2b4b64fc68a87beca3ed139fe2c5795367e34fd
SHA5122c15d7c3953f7647e7e9c54d0148133b0371c30e13ef7820c53b918361390b9d0a4bf3799d2f4b55d19d0994852e41c1ff616cd9124da6967e36d472c24c9567
-
Filesize
88KB
MD5b86169a7aca524652a1b11433f27e196
SHA15ea69d0ad8326cff64d02dcba17b9a2b0526b562
SHA256de58ffd1ece9125ea2156d5b656f583717d75feade65991817199cbd1faca26e
SHA512367069eaf0735d71b99b6e2a72e9c015abdf4935ef302d6f263c765b79b552e69945958063c32abcd69483125e293a457ddfcd95dd28592d38f7d7e09efb97f7