Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
36s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 10:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.dropbox.com/l/scl/AABhrH28m2wd-X0TOPZ0R8-Frk_Ny82H7tU
Resource
win10v2004-20240704-en
General
-
Target
https://www.dropbox.com/l/scl/AABhrH28m2wd-X0TOPZ0R8-Frk_Ny82H7tU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133649091789627690" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-587429654-1855694383-2268796072-1000\{8B89A2BC-B31F-4C0F-8D45-65DB0C45EF6F} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2208 chrome.exe 2208 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe Token: SeShutdownPrivilege 2208 chrome.exe Token: SeCreatePagefilePrivilege 2208 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2208 wrote to memory of 3632 2208 chrome.exe 82 PID 2208 wrote to memory of 3632 2208 chrome.exe 82 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 3572 2208 chrome.exe 85 PID 2208 wrote to memory of 4468 2208 chrome.exe 86 PID 2208 wrote to memory of 4468 2208 chrome.exe 86 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87 PID 2208 wrote to memory of 1616 2208 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.dropbox.com/l/scl/AABhrH28m2wd-X0TOPZ0R8-Frk_Ny82H7tU1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff52a1ab58,0x7fff52a1ab68,0x7fff52a1ab782⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1884,i,16297011310237333116,15563503058951422665,131072 /prefetch:22⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1884,i,16297011310237333116,15563503058951422665,131072 /prefetch:82⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2204 --field-trial-handle=1884,i,16297011310237333116,15563503058951422665,131072 /prefetch:82⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1884,i,16297011310237333116,15563503058951422665,131072 /prefetch:12⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1884,i,16297011310237333116,15563503058951422665,131072 /prefetch:12⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4316 --field-trial-handle=1884,i,16297011310237333116,15563503058951422665,131072 /prefetch:12⤵PID:388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3488 --field-trial-handle=1884,i,16297011310237333116,15563503058951422665,131072 /prefetch:12⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4584 --field-trial-handle=1884,i,16297011310237333116,15563503058951422665,131072 /prefetch:82⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4604 --field-trial-handle=1884,i,16297011310237333116,15563503058951422665,131072 /prefetch:82⤵
- Modifies registry class
PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4940 --field-trial-handle=1884,i,16297011310237333116,15563503058951422665,131072 /prefetch:12⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1884,i,16297011310237333116,15563503058951422665,131072 /prefetch:82⤵PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3180 --field-trial-handle=1884,i,16297011310237333116,15563503058951422665,131072 /prefetch:82⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4504 --field-trial-handle=1884,i,16297011310237333116,15563503058951422665,131072 /prefetch:12⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5464 --field-trial-handle=1884,i,16297011310237333116,15563503058951422665,131072 /prefetch:12⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56e76dd00c046d260f0368c09344fc198
SHA1691c0741d1da044addb2e239737e9f7344835ff6
SHA256b9ed6d825c2d3930b0361dd76efbe99f1e6634086cc9bb68d1efff86d863515a
SHA512cfaf105ee6ecd5ab45e9c191bccda7c10ae9fc92817582c0a15c58bcf14121424b193ff5f38a54d780fe2a60750fdad668a4ec103893771042a423548881bad3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
687B
MD526c50543ca736794a09707054981215d
SHA1dadaf3a8b489628f54166ccdb4e06b8b5e85e0e6
SHA256fec9020e4bb2c8535d1d6dec05daea240c6e4a9d2ba2d5ae60a7130af277c34a
SHA51203cbcb3cdb2a393a9cf08e73613ab1fad94457572ec6a05598bcb127ecd968018910bd0b3d85ff7cf9e7a58ed2c56da866337262fd432994f9155c99eca1984a
-
Filesize
687B
MD56bcc79eb956840e687a3ddf77684ae0a
SHA1b59611d3e2745bb98579f871e31e54799097be34
SHA2560a17498ef26dbd55548cf4cce6a34e811b0f7831cc1bfe412824f4eb63e7b0c5
SHA5127a4b8e8f74f0baedce843264ff1c146cea5043f6e8ce867cd2c82fa2cf06b4d6b10f0ce4b949bbb16de44483e5c111b0625aaa3e06cc25b8639c5d5df24f6f0e
-
Filesize
687B
MD5aea32c432d9a00954a8d16c1b90dab7a
SHA131628253fb1cd005161fc93d548773a76f568b0e
SHA256a63dd99e8c718b1fddbd23f3cd950a98f529c09cce1a484c0c827bbefcf090f2
SHA51278d14e7e85dd8176d217d6d2898cccdb2eab32bdefd9d06d8dae67c87dafa166a2ee6fba2427f9729b98444963b7bc70e171e54bb39188f2fe635a638fe22889
-
Filesize
7KB
MD557ab66bc1347e1524e77a1cb895af26f
SHA1db0cfeed3eae2cc6626df671366e0c95797ca950
SHA256b504da4ccc44c2e3ffd5f733c74dae98c8edac2c5bc733428e4f95971d8318c4
SHA512169da77cc114a24a94885daa74a41cbabdb787fe8f8632086318f45face1fce3680fbf6bd78e186dcce6a1d2e5b6cc3606b1d23a353e564b4bab84de0ae6edbe
-
Filesize
144KB
MD51dabb45ebfbd944cc5ff6fc6b6bb7d75
SHA13076894893404a6f1684bfe85dfe38a92836f69f
SHA2560e53cbf4fd86d563363b8dc97fec4406ce83915d2e09ec8767d9de74b4eb53e8
SHA5126b3c90bfc4de7f1ae0889edaf92ff4c09678ee6ca14415d21233dc48ca14482449109649e53ae35c4d9af78c56efd4e69e074ae43ae9ba871fe3da58085b1de5
-
Filesize
144KB
MD5a4d9615f7099fcd5a3860aec1899fe69
SHA149710466562d1cebf48a2a3efdc2a7ed8fb2be33
SHA2560f3ac01dac854b028816576758d43b4b561cb51ac4ab32a7695f9ac392b27bd5
SHA512bf810b42114e31180171256758908bbf19d341b7b33db70bb3d2d061dbe5e5a188a5a80206a48d9af545c717805c6a986481feee4a3002dd6f1f2e5ed670b7d6