Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
08/10/2024, 15:39
241008-s3nbqaxbjd 604/10/2024, 20:49
241004-zl1ztazenf 404/10/2024, 17:53
241004-wgp5zaxfpj 314/09/2024, 01:56
240914-ccskra1cnr 6Analysis
-
max time kernel
59s -
max time network
50s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/10/2024, 15:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Accounts.google.com
Resource
win11-20241007-en
General
-
Target
http://Accounts.google.com
Malware Config
Signatures
-
Password Policy Discovery 1 TTPs
Attempt to access detailed information about the password policy used within an enterprise network.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133728755702821725" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3870231897-2573482396-1083937135-1000\{A1B56613-A1D6-417D-AA36-C16C9E281DD5} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2808 chrome.exe 2808 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe Token: SeShutdownPrivilege 2808 chrome.exe Token: SeCreatePagefilePrivilege 2808 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe 2808 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2144 2808 chrome.exe 77 PID 2808 wrote to memory of 2144 2808 chrome.exe 77 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 3080 2808 chrome.exe 78 PID 2808 wrote to memory of 4356 2808 chrome.exe 79 PID 2808 wrote to memory of 4356 2808 chrome.exe 79 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80 PID 2808 wrote to memory of 3128 2808 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://Accounts.google.com1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac108cc40,0x7ffac108cc4c,0x7ffac108cc582⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2320,i,4279212109232715329,2376509935522962041,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2296 /prefetch:22⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1748,i,4279212109232715329,2376509935522962041,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2420 /prefetch:32⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1928,i,4279212109232715329,2376509935522962041,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2524 /prefetch:82⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3008,i,4279212109232715329,2376509935522962041,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3032 /prefetch:12⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3020,i,4279212109232715329,2376509935522962041,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3896,i,4279212109232715329,2376509935522962041,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:5312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3868,i,4279212109232715329,2376509935522962041,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4584 /prefetch:12⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4572,i,4279212109232715329,2376509935522962041,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3268 /prefetch:82⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4636,i,4279212109232715329,2376509935522962041,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4752 /prefetch:82⤵
- Modifies registry class
PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4976,i,4279212109232715329,2376509935522962041,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5020 /prefetch:82⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=212,i,4279212109232715329,2376509935522962041,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384B
MD56d87b2cff77c5b4ab73665fd4dc0061a
SHA19b04a2eba621fe6395544746626f796b67b4314f
SHA25664ee02f79790639f4797e78f784fc3cb73f99bcaf9216b5a906018ff5dc94bf4
SHA51281cf3949929fea1e8b63b731fead5ddd4020a8efc2a093fce76f314ace5302d16eed91b67a03b5d5f567acfd75ad59c016a8fdda251b42a8e9edc28fa9e61ae3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD588196800500d62390dfcf361cd3f9faa
SHA167b0873f1180419c26b772ee452d5b3ce831cab9
SHA2564bd9cc18e591f8b91908c4eb6b62ebe3c6e70effbbf41e2f832d92efecb60151
SHA512142aa0e12a6e4848ce1173bccd76eb61c0b60cb440499353a5f846acdd798ac5ae758ce01cc993b886dde0a95c3b35bce6ca7c6b9b11a131be1d88ee5d20f87a
-
Filesize
9KB
MD56852a30ba97a61adfc2a2c0a0b4ce659
SHA1e9b626d87d86cbca56595caa354b52fbc791325b
SHA256d6d09a15ff56ac6262fd9a00d697bc68de978ec65241c0157412fe433fdf5421
SHA51245b9b494b5cc058abfe55eac35b83ace4c58f6906edef4a902e538a9e9a190a9acf7d163da2b389cc63d8ad96d8245a02be355f80fb5cf9039a5abb27d2ea3ea
-
Filesize
9KB
MD5680f26af035ead35e22f927c2c006e18
SHA108f29bf6b4115d7b3cbec07ce0d89962565526ac
SHA2567b24ca270af390c3fefbd426a24f65b9dae99749e7180b6f4db51c4ae73337da
SHA512960fed6fc1163c2129d777222a68a5d4d3749eb3550e8b8885b16c30a99848cf810273c97040caefbd4906742b5a0ba01078c02c65ff3c04b25ab890fb1c51c5
-
Filesize
9KB
MD5f38ec1c686e00faa48f25e8b31b5f15b
SHA10e9b7325e21e7a975cf6b2adc8b1c1bc1b4ec4b5
SHA2569d1f578b840d9398b401290c42a0d6de920ab8955e357511a7ef20b4cb7f71fe
SHA512c9267baa821ceaea6cf5a73e5c7fc251550be6e837a35c96a705f71ea943e2d81458867ad10ec88d353a358cabb56513ab45b2023e0067b29e4bd46ec458e40e
-
Filesize
8KB
MD501423ee82fcbb7a03befbb3f477da4e8
SHA14a985a43f5ad2e4b96cf14d0f10597888e25d1b9
SHA25629ad98dd8c4b3ccddafa0e938a2121adc19f4483032e072e0fe4b2ab77d15795
SHA5123ce39f4318a65b92b2032cd0006564332f6b0f93eb20ec5f62e9a0014a51e496f8a7eea362dad770a68b8395fd71d572a297cb4d42a3f3daa322d7c7a24786ad
-
Filesize
9KB
MD5d56e6f84dfd6e032812b0b1ee26201a3
SHA1cb9b370acf21d9fe48fa4a1adaf971fd34f63021
SHA25687afaf4ef546271f1b32b1a7426597b7abb12beac4961d671db2254d75fa8081
SHA5121ad08eb2cdd5f05306f566513acbea72d478d460ce4122a74cc6d5cfc5883d81dcc3cd8b9dd611894b927c18af17cc07259cff9cbe425fc057422bdd803a4474
-
Filesize
228KB
MD510cf098b9f7aca73487e8f581e5eabc4
SHA162bdcd4979f933a66c81be86b6b7d2036f44d8d3
SHA25660448b2a32da91fb0e3ce15a7eba135864e333ba392f0972edf7b0a2fa8b887f
SHA512f0d7fe5c2342b21e49a80d26ae67d0cbfe474c20b75330c91cb022df2385ffe596595b1db0ef191d76013cb1dbb50bcdb0006320948ae628ed52a696c64f97e4
-
Filesize
228KB
MD5693ae254f68a2246b8bc15329d4254c3
SHA1e44cf155a0e685128a10ebca9e6df09aad906b37
SHA256c6c8462c1cfa12932e8b691368be7dc419de5675b7789afa3aadcd0ce42de0a3
SHA512c994c85d829a637b11052ad3db04b7435bda2e901ea3ef2225e6fc32e8d4502fbf7d9952a720dabf9e3ada179c757a7330eb3cb94474b77e8395be14062269c1