Analysis
-
max time kernel
122s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2023 14:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://soldbypat.com/401k/devr365web2023/
Resource
win10v2004-20230220-en
General
-
Target
https://soldbypat.com/401k/devr365web2023/
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows\CurrentVersion\Run chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133245820401953348" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1916 wrote to memory of 3880 1916 chrome.exe 85 PID 1916 wrote to memory of 3880 1916 chrome.exe 85 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 4236 1916 chrome.exe 86 PID 1916 wrote to memory of 864 1916 chrome.exe 87 PID 1916 wrote to memory of 864 1916 chrome.exe 87 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88 PID 1916 wrote to memory of 4568 1916 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://soldbypat.com/401k/devr365web2023/1⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffb64bb9758,0x7ffb64bb9768,0x7ffb64bb97782⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 --field-trial-handle=1828,i,8223961243473545994,15545335747134061354,131072 /prefetch:22⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1828,i,8223961243473545994,15545335747134061354,131072 /prefetch:82⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1828,i,8223961243473545994,15545335747134061354,131072 /prefetch:82⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1828,i,8223961243473545994,15545335747134061354,131072 /prefetch:12⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1828,i,8223961243473545994,15545335747134061354,131072 /prefetch:12⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5088 --field-trial-handle=1828,i,8223961243473545994,15545335747134061354,131072 /prefetch:82⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 --field-trial-handle=1828,i,8223961243473545994,15545335747134061354,131072 /prefetch:82⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 --field-trial-handle=1828,i,8223961243473545994,15545335747134061354,131072 /prefetch:82⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4892 --field-trial-handle=1828,i,8223961243473545994,15545335747134061354,131072 /prefetch:12⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1184
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2264
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:4936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD53721288872abc07364fc68551ef9c97d
SHA1374e8bac72281bc0c87ce84f49fa1ddb733d75b1
SHA256e91f65b4bdb3fa338ffb23016566b04ccab5a2702a39cd1ec77406fa620aa383
SHA5127d357645ce47ba99b90b09c3981aad735830c4d3b6f96f9861981c797a769db4d11ad3a2b534b44622a27fcee02f3d17cbbcb2ffb866afab61f041fac4666052
-
Filesize
2KB
MD56d676e9f3e777e9b5699c1c4d91bccd2
SHA1a1616eef9f0c2dec8f8fbcf135ce17e86614d250
SHA25657506e59ea3c6c4cd8620ce123d99168044bad21e73dc84afe8d6a3039e73e05
SHA512346495a76a5269d23cb57a57f76ddc93e0d6245ec2cce4d84a050feee118bbe85091fe8ce74f66ee894c646a8894afd6782bb833af9b89abd75cd891d90c8100
-
Filesize
1KB
MD5b4c2eeb877b43822d5b69a9f0c2d4a07
SHA141d062ca849f4cfcb99d8ce48e031ba8ca289ae5
SHA25618600e23ee7c948ebc52dfd8daa9f6c768b6081ee3ff7860fb22a1cb242df1d5
SHA512dc5fe0021e0fbf421973f6c7bca417d9dd37c8a31a3a712c640479421dc485405572db23fadd37c7a7801b1e67071f618952e28ed8d76581a44d2482644a0beb
-
Filesize
6KB
MD5a38cf1ed1558a32bec1cb46fee2e9b62
SHA1a3999d02e2796622f0ea1e66428b2a5f8620c9db
SHA2562388238df522a65f1a4101606731c8ddf7fd0858165e497a55b85bc380382d21
SHA51255996fecd583af5b17ce338990487a4dedb99215b6574b832e71a3ae98e8ea853df434ec6d80316ab96867dde3e7c3f920dbd1c5fd5793dc48d9498aa1283fbf
-
Filesize
6KB
MD5fbc1b61f0fea00c26cff524f22913da2
SHA12d38ccefec5be54dd22c623cbdefb287ff5fec1c
SHA2568d998ad6cb845e1a0910679bcc0991060f6be0a7885de25095d38e9c82142f0f
SHA5123d7aec3a342b7cbfec229ac2adc0e17e3347443676e37f3fcb98e3df2937f24ebd994f5c6a5661f6a8c505f13d53499955b97d4d614d3daf9a962becb754ed92
-
Filesize
6KB
MD5f9cd38389dad7d0bb5509d2a83ebd19e
SHA124defc68a151ac9b8eb43d797ed03d15575fd84a
SHA2560bc0912b6018cd8ece196bb37a2f455fd02a00c7dcb3ec9676ae5f1e00213217
SHA512862a12030a6afc9a51f095775559d413c6ec614f016c619e8b59100f76cc9fc48088efc1ca0e6fea42745633300833f4014e16a0646f6221a49ee50ebd9d25b8
-
Filesize
7KB
MD5fdca5dc663ac65492b07444cfde4c064
SHA15e0e4cc4bedb5e7f3b52ae794da05b5b3199dcf1
SHA25601db79734741d100b5ad186418538c26aaa7cdac88dcfb22b83678dbb8d72f34
SHA512a344190675f0d42eb3b0d57292b87ee9e5227977473f8d8fb67dc2001a3b568f392dbde3a6eb543089f775b8dcff016b3ee8533c1d6862e02f0962ce6f1b3484
-
Filesize
15KB
MD50b4eb3da3872693b7a9908566bf032cb
SHA17c00021952f73225dbd8eb16e92a8ca2a6fad9be
SHA256c2ceb4ffd5cff8d41c0a41c2273c39a47d16968a1495499764b3c351111e700f
SHA5125bff484d325279af4241459d12ad65b08b87d24f47ced1041970c9e2dd3ab6040fb1bff688b498c8c6305d85536f74c13b77d0b8efbd67ecc1292dae41d95000
-
Filesize
264KB
MD52158f39229829b0bcd900be757a949cf
SHA1492a13e0542b17764f2c84032418ca08d1ea2e00
SHA256b06e4c3cc7858cb66eab8e843efca25c152c6f2dc944a40905e8d017691f531e
SHA5129bc8102a85d765eb68ad9815de50e4b69dcb3350be6a61af8bb5a90d92b15903420b4c3141da6b811df8c47a390a1e57a36235d953f841abda0f33e98ad81b71
-
Filesize
144KB
MD57cb42ce96ebae898b0ce6d4b10580b44
SHA1e8558241cd5cf39646db30a5f56b164fe0873684
SHA256d096c9b2bab08871149ec5378e2ee8c3c7dc43444d41465b718d0231385d8688
SHA5124b78e02612d17989f928ab3dd5483ee5c4a04d5a7ef240e0eea212a9f82dd374d4266f444eb594c02806d1dd185fb63f25331c9a26bad4653a9ebdcd4b3ed12d
-
Filesize
144KB
MD5bf135e269d28f22891c5be396c13417d
SHA1cb95ff5f493ed5911176e2aee633b9abdf507018
SHA256b24ef459ac14bbc09a3af07137fa2b65b8eb3e9adb67b97682be28230c64481e
SHA512968019fa5069e065ae388c65fb28be760307b62e8fb18e291ac24c128d5ca1b42157a4b01304bd02a2e0a771ce973d3d9e1383790ae1b9a28d19f29df49f92fb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84