Analysis
-
max time kernel
299s -
max time network
286s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 11:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.facebook.com/people/electric-ola-scooter/61554405390138
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
https://www.facebook.com/people/electric-ola-scooter/61554405390138
Resource
win10v2004-20231127-en
General
-
Target
https://www.facebook.com/people/electric-ola-scooter/61554405390138
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133467694532189611" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4580 chrome.exe 4580 chrome.exe 2460 chrome.exe 2460 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe Token: SeShutdownPrivilege 4580 chrome.exe Token: SeCreatePagefilePrivilege 4580 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe 4580 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 3176 4580 chrome.exe 58 PID 4580 wrote to memory of 3176 4580 chrome.exe 58 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3792 4580 chrome.exe 88 PID 4580 wrote to memory of 3532 4580 chrome.exe 90 PID 4580 wrote to memory of 3532 4580 chrome.exe 90 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89 PID 4580 wrote to memory of 628 4580 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.facebook.com/people/electric-ola-scooter/615544053901381⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc7b5c9758,0x7ffc7b5c9768,0x7ffc7b5c97782⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:22⤵PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:82⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:82⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3296 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:12⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3172 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:12⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4600 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:12⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:82⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:82⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=916 --field-trial-handle=1880,i,6320109500613883871,10856539887141797254,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4652
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1152
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:2300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5a59f749193fd0463146342235e399d7a
SHA174370f27e2c24232dbe6a18737666dc72f178346
SHA25649c88a3b66bfb4684d360cc375d10a41b2e2e70372f96a4642eb12f76e918cc8
SHA512ee85ca64901fe04bb7f507ad822767475127b61938fb58cddf35c2f65ad01f4054f73bb2ba9365a4cf6249dbb0c170e715c2cece3a6a567e7140754f70333f6f
-
Filesize
720B
MD51dd990c0c171e57f844f17a2fc9d0263
SHA192b497ea5ab9881d06b5cb701fa672172def38b3
SHA256eafcc3b185aa105594f0bf972b6b64d3a2f325c90016fddfbaa7cc44d84d2d02
SHA512ec0047b1bb154b95f7ac06cabf75adb9dba1f54baf97e2a42f46f5db6864a2302ce00a804024f96d77f53818366de811c2b9cdb4cc66a2fed7c4a00b3ba2d928
-
Filesize
2KB
MD545716825cd04183d39929f7a2ed90f99
SHA1693ef5decf1937500d26e6f8db4a3105747c40fb
SHA256c04952b9af4bbb052fa5c2641084b76af013cb4453ffe68517b3706dc9aada56
SHA512d17a803ceca9bf66e10737da1397e0ded33f81d21cfcb05afbd07c497f901b8518aea86eafe3b372ba38459a4ca876a939f7d5877af1bce400fcb8fece44a7a7
-
Filesize
2KB
MD591ccc43728ce9f3c1308dd68e47c7201
SHA15a04b28be487ff6fc8d5adf37fec04a7cfe1705f
SHA2562709edeaa0dd6d788fe67e4c686e255595301bc2c615de75ea94da092b5ab6a2
SHA51231dc943a4825f0c4e4f748590bdaaf44526a15302cb82a0544335965e9eb4b3619df814c0ac9643e00a041d0affc5f7224f549a88e149250536d5ec53034044d
-
Filesize
2KB
MD5ae11a2156cad69de64c43df47f6c655b
SHA1fd0df06f5e2e59e42811a8249cfd96d7ed839532
SHA2568fba9f63960acdb504015193ab5a5940aa598828dbbd29124956247845068622
SHA512053f2763371c070dfd6b075e759c435537754d587e857ce9c96e5d915dbfbed6cb1362c329b2dd24071b2933b49d65cc649fcbe8cbe98396667f2a0d78ce7935
-
Filesize
539B
MD592c0d6aaae10301cc7be064de992066b
SHA1cce1606b71d29897675c83cc6a5437e127ef6e7a
SHA256461d5ecb1d01c3241d5db42079f8cd0801559ced6de755b40eaf3c2c1bc49a7d
SHA512cd46cd7bf1d12aa1c2e9da229a9d47b74691d14583f8683d4e53e086ab56d25c84cd6da58ecaf843b0ad87e17e987b8a387510c682a7be935487152765dc1b51
-
Filesize
539B
MD523eba17684b5b2051e4821a4ce59ffa0
SHA1c8d4b224c10eebd8e070e8ec8df8f13000652179
SHA256b98d2f712fcfc426bc906537dcd604c8f419ab6292abd4fc49ace6b71345221c
SHA512879749630366bdc458a069cc33d38152ed19df733d0bb300db485eb81cd1d379e5f9b5c2b8465d1d2a359962c49742dc261ce2472be52e86f1ddb108d5c64698
-
Filesize
539B
MD5729e396dcb6ae11c1ce66cff87ca33d7
SHA13259177fb474cefcc6ac48d22008987d648dc2c8
SHA2569d9e92643074f44bc8adeb98068b75c0b62840ba44040931e66b1775c806721b
SHA51245c4277edcfcf36aa4c894d71ee51c73ac7b8aa196ccae9ad6838f40c10b545dbd36a2cf4278bfccbdbab92196f78126660db5698453ee557e815156ca1bf395
-
Filesize
539B
MD53bceacc9c86f74914e68e623003a6d23
SHA123e8bb7126603a0468902edc644df41085157c80
SHA2569ef4d17b68a7fbab64fa1922bf6036cc6ca7eddad9359ce3308248bd37bd3987
SHA512ee4d31dc434d2e48c18e5d409ed948f51f93b47b2bab232e82a1ee209ecd049bb2097270e3dcc2b7a4a84d9ad2b403cd5f37fa47373e93fdaac59e5e942c96eb
-
Filesize
6KB
MD56692846cadd5b9622d9145676b581b6c
SHA1c5066c52131a6c79c4423504a8d4129597fa3a4c
SHA256b3aa7b55a89536fc50b4d1ad9e88b574f4f3a55b9459de035aa97acaed7631c8
SHA512d2d08089c08fdece369ad32484788774a00a9bde4acb9a269c435917e16c328c3688417540f9260e1752a7d195ceadccfe8048472acab0d42140d2ccc33ec0f3
-
Filesize
115KB
MD5a06c7354f7e4f364f2078aae0880510f
SHA184392fc397b984000eccde8a934fc38ff36fd9d4
SHA256f37e5499a6a147be51b2339c0ca0e58a7a7b0456d3ad2a50bb29b76a7943b56c
SHA5128298fd421f4011f4ac456782ad108b5dd4c199348acaa16a39fc7abfd8118cd2934ee51cce0285e534974cef72eb54f2f5208a4ce9b77f22816a0a591d7a4180
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd