Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 01:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.sylspeare.co
Resource
win10v2004-20240508-en
General
-
Target
http://www.sylspeare.co
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133603815800899511" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 1184 chrome.exe 1184 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3812 wrote to memory of 2660 3812 chrome.exe 83 PID 3812 wrote to memory of 2660 3812 chrome.exe 83 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 3324 3812 chrome.exe 84 PID 3812 wrote to memory of 2736 3812 chrome.exe 85 PID 3812 wrote to memory of 2736 3812 chrome.exe 85 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86 PID 3812 wrote to memory of 1524 3812 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.sylspeare.co1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffffe2ab58,0x7fffffe2ab68,0x7fffffe2ab782⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1924,i,10368655200588270460,5634327001001006628,131072 /prefetch:22⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1924,i,10368655200588270460,5634327001001006628,131072 /prefetch:82⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1924,i,10368655200588270460,5634327001001006628,131072 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1924,i,10368655200588270460,5634327001001006628,131072 /prefetch:12⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1924,i,10368655200588270460,5634327001001006628,131072 /prefetch:12⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4328 --field-trial-handle=1924,i,10368655200588270460,5634327001001006628,131072 /prefetch:82⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4324 --field-trial-handle=1924,i,10368655200588270460,5634327001001006628,131072 /prefetch:82⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4476 --field-trial-handle=1924,i,10368655200588270460,5634327001001006628,131072 /prefetch:12⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4068 --field-trial-handle=1924,i,10368655200588270460,5634327001001006628,131072 /prefetch:12⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 --field-trial-handle=1924,i,10368655200588270460,5634327001001006628,131072 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4600 --field-trial-handle=1924,i,10368655200588270460,5634327001001006628,131072 /prefetch:82⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1924,i,10368655200588270460,5634327001001006628,131072 /prefetch:82⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3876 --field-trial-handle=1924,i,10368655200588270460,5634327001001006628,131072 /prefetch:12⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4652 --field-trial-handle=1924,i,10368655200588270460,5634327001001006628,131072 /prefetch:12⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1576 --field-trial-handle=1924,i,10368655200588270460,5634327001001006628,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD51a4b61156d58f08bd819a030c47f76cd
SHA13890ed80d699aa47f09ad60c90250ddf0b256185
SHA256c8c462dfaf82ab1f58b16cc0101df4ab8f51651c19684ba6336f540119341362
SHA512967b470e47804b8c374b090ee08f60650ea209b2b3b80559736a2176c5c1e1b3b3f13096cdc83e33b1680a0461bd9cd582cf6f0e59dc6a98e25d49d3fa568c1b
-
Filesize
277KB
MD580e7613f9de448825f3c0af74eeec1ee
SHA1bcde7c58fa755c623c987843b2a074d3ddad43fa
SHA256fb99c5049317605f77ecfa5fe8448f071319b5fae7e106f95df06375c2638256
SHA5125f6306302b3f71c7b0d25f781a47621b64feb13b7689415c9998935002a81766f9a57b6cc51014b74adcfedd4e6caa5790b73efa0d6b7a5c93649987f18c67f3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD501612aa31d800fd8bc873d72041f4d31
SHA1d6aeb50ef2f9481ffef7aa5e36074600f0235da5
SHA2568a930c23940d8271337a93e0854836154f7688a952476039496bc17397c1ff63
SHA512f96f1bc98f70fb3dfcb2a971db3337fb1308e3cf1900ba837f2931c88b5ca069b6a4a740ff4538b89a434362b255bc25f85bcc72e51b5ef5d0c378573a8e5f60
-
Filesize
257KB
MD5871aaf0ada1b6fe8f3bc84507c79fba7
SHA1f4895c5a61b26648def06adc8ee64cba4da5e9e3
SHA25611698ea0b45bc5abb16a26bd61b75a93aa8a9a5cd0babb52ade335f7c7d7e330
SHA512ab113cb3b71b3163395f4dbbd4cdbb92243e3a32b815741b931bb933e27220ebe268a328a0afb41476cbb7405d43d4f72062cbf23d1d74e75f0e5d00caea5dac
-
Filesize
257KB
MD567fb039259840d0e70c0322ea642a771
SHA17ca4a07ba9f5c7df66a8f192ef8fe22c496e63f1
SHA2568bbbed963d55f8c27ceee8e939a2eb5ef5ac1e093356b9766c4048c7b49fa81c
SHA5125eb4817bf63d56193c79538f85b432e469ebbc1385a44cc7ffa975a7d6551e741bad30b4d30c54fc270e24c2180aea85c17cc3bc53b332e1860a1bfbfc5c623d
-
Filesize
91KB
MD52d5d6bb212c96e0dac485c83ce4b1f53
SHA1d12e9bda0b7dc91a675dbb2e839f571d0cbb217f
SHA2563820a2653cae15a5e8aa2006685427d561a5da3e89cb9cbe55767f3d00f48a75
SHA5120ffbcb7dc3bb7128114b63b7101c235e0f04883f041d847d9bd3c0cd1e662e38eccceab320e51827263f380b877fbd4779344ebcdc27502668bff4d4f5e9b499
-
Filesize
88KB
MD5fe922cbd0020c55b688ca19427750c81
SHA1109f3eee617d7f820c2366fb70e8b5f542915733
SHA25653c8c10b2d1995ec55f042499b06a358d0a9fd382b631526f1306c57295f1a21
SHA51272f5e4b7fda1b94fb700dc87b7c5cd248f1e5ac5e6b535b7d1789b188ad2d779085eb659ddfb009db935bdc8ebb36733ee437e5e82f8d9f8c1c62c3564206180