Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2024, 19:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mandrillapp.com/track/click/31017443/www.coalitioninc.com?p=eyJzIjoidkE2OU5jRXJFM3liSG9RN0JnTTc0eXRJYmV3IiwidiI6MSwicCI6IntcInVcIjozMTAxNzQ0MyxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL3d3dy5jb2FsaXRpb25pbmMuY29tXFxcL2NvbnRhY3RcIixcImlkXCI6XCI5ZjhlMmU5NTIyYzM0MjZlYjc3ZWFhMTc4MzI0YTA3ZlwiLFwidXJsX2lkc1wiOltcImU2ZWMwM2JiYTk2YzY1ZDEzODcxODU0YTdhNGE3MGRmYTkyMzEyZmFcIl19In0
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://mandrillapp.com/track/click/31017443/www.coalitioninc.com?p=eyJzIjoidkE2OU5jRXJFM3liSG9RN0JnTTc0eXRJYmV3IiwidiI6MSwicCI6IntcInVcIjozMTAxNzQ0MyxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL3d3dy5jb2FsaXRpb25pbmMuY29tXFxcL2NvbnRhY3RcIixcImlkXCI6XCI5ZjhlMmU5NTIyYzM0MjZlYjc3ZWFhMTc4MzI0YTA3ZlwiLFwidXJsX2lkc1wiOltcImU2ZWMwM2JiYTk2YzY1ZDEzODcxODU0YTdhNGE3MGRmYTkyMzEyZmFcIl19In0
Resource
win10v2004-20231215-en
General
-
Target
https://mandrillapp.com/track/click/31017443/www.coalitioninc.com?p=eyJzIjoidkE2OU5jRXJFM3liSG9RN0JnTTc0eXRJYmV3IiwidiI6MSwicCI6IntcInVcIjozMTAxNzQ0MyxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL3d3dy5jb2FsaXRpb25pbmMuY29tXFxcL2NvbnRhY3RcIixcImlkXCI6XCI5ZjhlMmU5NTIyYzM0MjZlYjc3ZWFhMTc4MzI0YTA3ZlwiLFwidXJsX2lkc1wiOltcImU2ZWMwM2JiYTk2YzY1ZDEzODcxODU0YTdhNGE3MGRmYTkyMzEyZmFcIl19In0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133499929709566865" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3220 chrome.exe 3220 chrome.exe 3296 chrome.exe 3296 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: 33 2300 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2300 AUDIODG.EXE Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe Token: SeShutdownPrivilege 3220 chrome.exe Token: SeCreatePagefilePrivilege 3220 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe 3220 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3220 wrote to memory of 2116 3220 chrome.exe 44 PID 3220 wrote to memory of 2116 3220 chrome.exe 44 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 3240 3220 chrome.exe 89 PID 3220 wrote to memory of 116 3220 chrome.exe 91 PID 3220 wrote to memory of 116 3220 chrome.exe 91 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90 PID 3220 wrote to memory of 916 3220 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mandrillapp.com/track/click/31017443/www.coalitioninc.com?p=eyJzIjoidkE2OU5jRXJFM3liSG9RN0JnTTc0eXRJYmV3IiwidiI6MSwicCI6IntcInVcIjozMTAxNzQ0MyxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL3d3dy5jb2FsaXRpb25pbmMuY29tXFxcL2NvbnRhY3RcIixcImlkXCI6XCI5ZjhlMmU5NTIyYzM0MjZlYjc3ZWFhMTc4MzI0YTA3ZlwiLFwidXJsX2lkc1wiOltcImU2ZWMwM2JiYTk2YzY1ZDEzODcxODU0YTdhNGE3MGRmYTkyMzEyZmFcIl19In01⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb23a79758,0x7ffb23a79768,0x7ffb23a797782⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=304 --field-trial-handle=1836,i,13091102982246349565,11642059941687179504,131072 /prefetch:22⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1836,i,13091102982246349565,11642059941687179504,131072 /prefetch:82⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1836,i,13091102982246349565,11642059941687179504,131072 /prefetch:82⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3024 --field-trial-handle=1836,i,13091102982246349565,11642059941687179504,131072 /prefetch:12⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1836,i,13091102982246349565,11642059941687179504,131072 /prefetch:12⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4712 --field-trial-handle=1836,i,13091102982246349565,11642059941687179504,131072 /prefetch:12⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3216 --field-trial-handle=1836,i,13091102982246349565,11642059941687179504,131072 /prefetch:82⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 --field-trial-handle=1836,i,13091102982246349565,11642059941687179504,131072 /prefetch:82⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 --field-trial-handle=1836,i,13091102982246349565,11642059941687179504,131072 /prefetch:82⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=884 --field-trial-handle=1836,i,13091102982246349565,11642059941687179504,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3296
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3716
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3d4 0x4e81⤵
- Suspicious use of AdjustPrivilegeToken
PID:2300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD57d3192e74b0cafb836381bdf443e8b2f
SHA185f60411feb9385d5560f5c83ea777e34c2fb027
SHA256f8c18be31240d7bbdc9a1a98e63d094ee21436adf5733f1750541f7455c79139
SHA51225656f6187520aac649a8afa350d6f937d29ba32f91eb28d176ee0bafd1d270a83a556aa6ed4f8f962a01a145147db4ace29d00b0ac721c373ea71b71687a52f
-
Filesize
5KB
MD57a80eb54d5c2b87863df25eeb13891e5
SHA19f9cb8987d2556c29cc82dbbad3c3b0a0500003a
SHA256c61a4c2ef7ad19e0fde8834b00ee979a9a25e747abe3f5c91e537fa26af64b04
SHA512a6d2e2963d8f59b1618543ceb8a3837b5b00606bef864aae708ffd87bd0e52f5da225e9013109c201a915fa580434ad4e23db97adfabcc231b0fed81ff7bc4da
-
Filesize
3KB
MD59bf4fe71bb1e4d2a0afb9fef9ab60d86
SHA19ab91dfc452f47e956b8b6390663e557b9fb081e
SHA2565bd3580d72f74776b3e13347dc14950a926052397a04eb8c6141ac4f2c2ae34c
SHA512cedc212147d6f85f7659450d68c7ca8139f4ffce96a33d55d8efc16782aed5d836fb70bb2853496f6dfc7ead1d2d99c4e0c4d35e71a86ff9917196c1397c1cd1
-
Filesize
6KB
MD5e9c5f1bd37c1aa87601195e00693f39b
SHA1a2b24f717dfdf37fedc42f68b4ba3c4601a82f94
SHA256cd623d6a446646554222836ee95457f245c1f62c5aaba86a5ecddc637f43b001
SHA512d67d5af657670274226ae3d3e047f9d7761d21a075668ed1269a85190061c65cecd7360fef53ead86255bc517663eb782fcf65bb6ec0bbc3c4d5df7ec399ee41
-
Filesize
114KB
MD5d360549f83a18a7f175f98f679e8637b
SHA18412e068cdea9e9e39ab97314c104d1e816c2f5f
SHA256eb0dbcbb70c4b24c0f336c2133b9f69f5e6dfe4730ead2b98cd8f449435dec92
SHA51294b60e97760eed558595a91c126d5da74545191c873c77bba4bf37cb9ae92b760a638b8b3ce7448b8ab94d67d478c21fee11cebfd1508c61bf2895821df3e235
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd