Analysis
-
max time kernel
59s -
max time network
59s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/02/2024, 09:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ecrmomcl.verizonwireless.com/omclickservice/document/click?a=ECRMOM&c=0&i=4932F497-F27A-FA21-9256-3032C4B644FC&t=https%3A%2F%2Fwww.verizon.com%2Fbusiness%2F%3Fcmp%3Dvcgref%26cmp%3DCRM_M_CU_OM_EM_NOT_99_99_8122217067
Resource
win11-20240221-en
General
-
Target
https://ecrmomcl.verizonwireless.com/omclickservice/document/click?a=ECRMOM&c=0&i=4932F497-F27A-FA21-9256-3032C4B644FC&t=https%3A%2F%2Fwww.verizon.com%2Fbusiness%2F%3Fcmp%3Dvcgref%26cmp%3DCRM_M_CU_OM_EM_NOT_99_99_8122217067
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133532422599246382" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4736 chrome.exe 4736 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe Token: SeShutdownPrivilege 4736 chrome.exe Token: SeCreatePagefilePrivilege 4736 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4736 wrote to memory of 4820 4736 chrome.exe 20 PID 4736 wrote to memory of 4820 4736 chrome.exe 20 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 4720 4736 chrome.exe 83 PID 4736 wrote to memory of 1280 4736 chrome.exe 81 PID 4736 wrote to memory of 1280 4736 chrome.exe 81 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82 PID 4736 wrote to memory of 1104 4736 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ecrmomcl.verizonwireless.com/omclickservice/document/click?a=ECRMOM&c=0&i=4932F497-F27A-FA21-9256-3032C4B644FC&t=https%3A%2F%2Fwww.verizon.com%2Fbusiness%2F%3Fcmp%3Dvcgref%26cmp%3DCRM_M_CU_OM_EM_NOT_99_99_81222170671⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0x84,0x10c,0x7fff17bf9758,0x7fff17bf9768,0x7fff17bf97782⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1848,i,5226423800538072621,9113351082369784173,131072 /prefetch:82⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1848,i,5226423800538072621,9113351082369784173,131072 /prefetch:82⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1848,i,5226423800538072621,9113351082369784173,131072 /prefetch:22⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3088 --field-trial-handle=1848,i,5226423800538072621,9113351082369784173,131072 /prefetch:12⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1848,i,5226423800538072621,9113351082369784173,131072 /prefetch:12⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4584 --field-trial-handle=1848,i,5226423800538072621,9113351082369784173,131072 /prefetch:12⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4704 --field-trial-handle=1848,i,5226423800538072621,9113351082369784173,131072 /prefetch:12⤵PID:488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4504 --field-trial-handle=1848,i,5226423800538072621,9113351082369784173,131072 /prefetch:12⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3796 --field-trial-handle=1848,i,5226423800538072621,9113351082369784173,131072 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 --field-trial-handle=1848,i,5226423800538072621,9113351082369784173,131072 /prefetch:82⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 --field-trial-handle=1848,i,5226423800538072621,9113351082369784173,131072 /prefetch:82⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
143KB
MD5d89d302da43f2175530916825bf77b21
SHA1ebd36a5f1ebfbb35c32b48dfe8c68e559106f4a9
SHA25649953f9ca00f0f9bef0a10c15f8efa6d73277cf2dd12b9e186f903b9082e86c5
SHA512a0bee7b0ab425e0402767ea29bd7dfc566650f02d4da2a5c974d69d0c2f77ef0461fc5fc14c3ab5cbc88572b7d4f2ac3fd231b772b30063ef6a1c13db4c7907c
-
Filesize
888B
MD5a3c7cfa981b3f71a27ceb07c2b6d45bb
SHA19cdc51ff7a6a070eb6da35cacb43f0ad355f2e75
SHA256fe7d588ef8f838e2b516868ebae00e019f9ec1a99f3b6aa1424aac259031d0c1
SHA512e0afc4a324bc1b1bd48bb2c4700a1fe6476cdfeafb0b8594210d2767d23d1ae320dcea9ab10470db4ca5d0879c07abe7a2549c2d7a8ced8ef92db8300059437b
-
Filesize
2KB
MD5be7df01c0f0db9f240b2186595c2b9cc
SHA1e41c6eb90e0e8ea352b1dbe0ac9bd40a789df5f3
SHA256eac1cc8af879ccc36ec3918f94aa07ab12d0ff71990e9b52f52cd575f8f998cf
SHA512e2cbb719f11191af427d51e3fb4144f4c655f4a9399c5be48e0ab55cda2313a8f9fabd4501a2dae3ea5c41da7176edf4055cba64e28ea645dd1c15662aad38f7
-
Filesize
6KB
MD5bcf317179091f4e3ec11302a0ecd5181
SHA14e42983a7bcb9c781990e396f7ebb8a6ef61c88d
SHA2560c4d67ce3e1997bacfc145704a6c6fdab25a9f43aa5e8c6112e9849929920583
SHA512bc412de5b8d5ab36867733445eed7e23daba3b6b534777175465cb137a4a95e1a4f24d3bed938396390c7e87cb62cb1d85536b4ca11e91a14f5c1017edc65b0d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\f408d72760346174a3495f2988b0601f21bd7b02\index.txt
Filesize188B
MD585839adf1665bd78d28600c38936bcbf
SHA18957234f3052d7f528ebd25cecb60998aacc268b
SHA256b211432df4da7b6aaba3bfb27e2ac5f4467e1055790e01402040d94a821af348
SHA51219befa79ef9c78e14e9bc84e08355cc0d79f6adf1512cdd72b19404ff604d13cb3625e2aea7a5a9b33e951f7cf08a96f0301897d7ec12a7f3cbbc955a0320a14
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\f408d72760346174a3495f2988b0601f21bd7b02\index.txt
Filesize181B
MD5256080d6f0d11aab531948fb8e79a429
SHA1fe668a20c1bcb97d52142ab239357695ad771945
SHA2568c7c7bb24bed283df451592b6ee38961847e6de6db24ef6c549299d2bd02f8a1
SHA512ca1b1cef45afb0c3b0e95f4abaa16ac2bad17f7278667adf7875073bed050cbbacb5b0cbabfd1c37c971530f87353e4a256531a379edc28bd98eca22bb881ad2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\f408d72760346174a3495f2988b0601f21bd7b02\index.txt~RFe577407.TMP
Filesize129B
MD530f7a2da4ba804019995340268e7cb2c
SHA18310ba8ebbede258e20e79cfc9b27652a54edb43
SHA2569fec58c8688ee8becdf0e7d7dde9fd515eadb0aa2df1b174385a31583e446a81
SHA5126ae2e1df133850961a3becc63e96251a453518cefa1082f87f8de09b44864df52fdae70189443a646e45c34c818e4b0aabc95dc8c1454e0c36e2e121b42350e8
-
Filesize
130KB
MD535df8b6b9a071f4a67106e703d4e4d51
SHA186014ac0ab0b3624eb0194c9930f7f8fd1aaf562
SHA256338a9eff87a23850a08330cf360ccbab5cc582d7c904d817a9a4a672a755a3e9
SHA512b16c6f4f6eb1be710c6eb1c8faa313a6841cbadd39c12d3b24f2e467f7b4c17ec2dcd4ffd3a98b3f500b092830b63171d5041cac646bfe452b81fa82e80ea6f9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd