Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 03:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r.maas.mail-oddle.me/mk/cl/f/sh/WCPzyXJTZ72iiLrkXldW8j4usAN4h8R4/y1NwnageYR2u
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://r.maas.mail-oddle.me/mk/cl/f/sh/WCPzyXJTZ72iiLrkXldW8j4usAN4h8R4/y1NwnageYR2u
Resource
win10v2004-20231215-en
General
-
Target
https://r.maas.mail-oddle.me/mk/cl/f/sh/WCPzyXJTZ72iiLrkXldW8j4usAN4h8R4/y1NwnageYR2u
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133501072958967082" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3076 chrome.exe 3076 chrome.exe 4308 chrome.exe 4308 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3076 wrote to memory of 4948 3076 chrome.exe 84 PID 3076 wrote to memory of 4948 3076 chrome.exe 84 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 4424 3076 chrome.exe 88 PID 3076 wrote to memory of 3316 3076 chrome.exe 89 PID 3076 wrote to memory of 3316 3076 chrome.exe 89 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90 PID 3076 wrote to memory of 3164 3076 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://r.maas.mail-oddle.me/mk/cl/f/sh/WCPzyXJTZ72iiLrkXldW8j4usAN4h8R4/y1NwnageYR2u1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0e699758,0x7ffb0e699768,0x7ffb0e6997782⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1872,i,5140054773757557625,18122328950107539777,131072 /prefetch:22⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1872,i,5140054773757557625,18122328950107539777,131072 /prefetch:82⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1872,i,5140054773757557625,18122328950107539777,131072 /prefetch:82⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3132 --field-trial-handle=1872,i,5140054773757557625,18122328950107539777,131072 /prefetch:12⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3164 --field-trial-handle=1872,i,5140054773757557625,18122328950107539777,131072 /prefetch:12⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4480 --field-trial-handle=1872,i,5140054773757557625,18122328950107539777,131072 /prefetch:12⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5036 --field-trial-handle=1872,i,5140054773757557625,18122328950107539777,131072 /prefetch:12⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4816 --field-trial-handle=1872,i,5140054773757557625,18122328950107539777,131072 /prefetch:12⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5328 --field-trial-handle=1872,i,5140054773757557625,18122328950107539777,131072 /prefetch:12⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5536 --field-trial-handle=1872,i,5140054773757557625,18122328950107539777,131072 /prefetch:12⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3144 --field-trial-handle=1872,i,5140054773757557625,18122328950107539777,131072 /prefetch:82⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 --field-trial-handle=1872,i,5140054773757557625,18122328950107539777,131072 /prefetch:82⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2300 --field-trial-handle=1872,i,5140054773757557625,18122328950107539777,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4308
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960B
MD51f0c6c0a5da0e50162bd67750c3ffb83
SHA1fc9818900e15723409d8a1fdb907d97baa12a2b4
SHA256afdbd0bf75ea0fb167ac844d143fb36a7e9569f752dc4d9cf706c360e07df39d
SHA512dd2907334cde8ebb99eff455eea73cdbb8ff654945350486b5e8808d7d35e86201b43818d442551eddfc3706d9228fe31ef655396ca18ec32447562429eddd63
-
Filesize
1KB
MD5144a232674d07a20656091779d9cfd35
SHA1e517148f6390335e243f373096016d5f24a556a6
SHA2565db6d694d37a5c171275057ce46dc0036eb18aa85d232b8240e8c51e787735b7
SHA5127ccc9b218c4035410727ed01fbbeecd57635066cbaa72f088e9049c0b6e5c7e219526d94f0cc9ea871b8777ce475ab6ae9bbd5decd468f33f056ce46db251f16
-
Filesize
1KB
MD5ac6610b0a0d837d1353813f213a5f2ba
SHA180ba927801ca6b36fe71e4b86d815e4fe6014e46
SHA25672df535acf323c3c37b618e806e4a20617a95ad2e96fcb280700fb064edb38b8
SHA512736281c1dff0b2f10a1b066f6576b77a6f6804cff1cabb33a9c6da8cec821fc8d2d0023b8c5f7c67fe81d6776f7cf3679dd8b02304d9d8168aba7c7d7db3ff16
-
Filesize
6KB
MD563fa5d9fd4ae25d8d9619cc2dc61798b
SHA1ebcd0e4304bd4ab7d720acce5981277c8ff89b8c
SHA256306f7d8dfe1192f4de9c2be2d1ca5f987b04a86ae78ca3d45d3715c9dfcabc53
SHA5124cf29e443a62fe2949151eed81f29097b85ead9326f9c87e32ff93c8bdc9a30b13608de9272c46b56bb6fc930455a3120d650ef6c7bab2609bd1127e15600aa5
-
Filesize
6KB
MD5fcfd1c8823b365499660dc78a40022d7
SHA19d85b5d9d5e9b7fca6c74e977081f9ed434b4e9b
SHA25648bd7fde0a5b150ad84cf982a68f5214c8d31b356db60242c680d1c9a03a4256
SHA512f78ba8f8ad70f05dfb28c2f9ff34f2ee8ff5cf94be62f1a18187fdd47122afbdd6929fa5e899f56b5168578a133dbedd437928e94633f6f2b9dd9472bc4fdebd
-
Filesize
6KB
MD5d6f883a672d1ab2028be50fa977c3a69
SHA12da049cd861782c8176cd7085df6c38dc49b5536
SHA2569d718e85e132cec3308927a0d7895c55e8a9d138122ca351225c457aab80c992
SHA5126860b48a140f9a1f8bc8896fced94ef1f79f9ee87639a7aa1ddb93436cb25dea63d59ca9813e15eed83835a17afc8dfd2625317888d1e1433224e77b9b1f2279
-
Filesize
114KB
MD55078f4e795230af3d70e99a40832bb00
SHA1e8f13efc6d286fce84a2fc699fa3c43f1f2e1821
SHA256facca26b0c291954df0da2925a4ad469618386f707652f4d7fd5e23a779fd3b9
SHA512607fa0391165cbac1d3014eda8015fdeabbf174692948b20978fd08a323b23576e5486a1f5a07b1592cdbfbba7d4fc060ad065e91aeae5358683fd4e00d37809
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd