Analysis
-
max time kernel
81s -
max time network
76s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-01-2025 21:31
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
sample_rule 6 IoCs
resource yara_rule behavioral1/files/0x001900000002ab8c-71.dat sample_rule behavioral1/files/0x000400000002a6c0-78.dat sample_rule behavioral1/files/0x001f00000002aaf3-91.dat sample_rule behavioral1/files/0x001900000002ab93-110.dat sample_rule behavioral1/files/0x001900000002abaf-149.dat sample_rule behavioral1/files/0x000300000002a6d8-178.dat sample_rule -
A potential corporate email address has been identified in the URL: [email protected]
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133806727277849672" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1224 chrome.exe 1224 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe Token: SeShutdownPrivilege 1224 chrome.exe Token: SeCreatePagefilePrivilege 1224 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe 1224 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1492 1224 chrome.exe 77 PID 1224 wrote to memory of 1492 1224 chrome.exe 77 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 2664 1224 chrome.exe 78 PID 1224 wrote to memory of 1992 1224 chrome.exe 79 PID 1224 wrote to memory of 1992 1224 chrome.exe 79 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80 PID 1224 wrote to memory of 3756 1224 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://url.us.m.mimecastprotect.com/s/xLxJCOYo09UvQprO7TEfDSGUszs?domain=elevafin.com1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0444cc40,0x7ffa0444cc4c,0x7ffa0444cc582⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,7791782710182871488,1739768863639713558,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1804 /prefetch:22⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2072,i,7791782710182871488,1739768863639713558,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2084 /prefetch:32⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,7791782710182871488,1739768863639713558,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2180 /prefetch:82⤵PID:3756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3048,i,7791782710182871488,1739768863639713558,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3080 /prefetch:12⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3056,i,7791782710182871488,1739768863639713558,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3540,i,7791782710182871488,1739768863639713558,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4516,i,7791782710182871488,1739768863639713558,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4664 /prefetch:82⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4844,i,7791782710182871488,1739768863639713558,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5faeb9fbac3b9b1a296b63c35ae1210e8
SHA121e83f4b1607c8f163009958fe5d4ed6c59b25e6
SHA256a18cd41e5561fd01bb7fb62bc2ab834cae36a938960ba7ade3381a3ffb1c032a
SHA51201acc0efee5869b54f3d71f39dc6b0e8c3b711301f7fd3e1ec241f84eeeb19d2f8f84039e0efbeb6986bded8eb14737bd87f4d699d4fb5fd29a36d52701901bc
-
Filesize
360B
MD570400e3dcc5eb3a2cf822c3723d21492
SHA1088a297b97ffe95d0ae334ec0681dce36c1c80bc
SHA25677b8032b64ac0069a7d8e43b377b83a4cbf7b8db070e5a1f8f9b06e3ea0e19ec
SHA51221f2fd591deafe8af4b02c93007361cda8636e23a060ade80f81d58410728a80b9748bb2a34ae56e49975262f378e9dfd95038637173378d95c6942dde0e072e
-
Filesize
2KB
MD5db53a2bcb502d445e1ea8a42af7457ba
SHA1ad5fb26e651c61ae9afb467e8819309c886a5666
SHA2567ba0006af5b0fc139cb82b7fbb2707e098e9587c5643057b129bd161a7bbc710
SHA5129b1e65fece61fa70e492c34c31c07a22fba3223a180f69b27da81b8cd624fda5ebcf241b343dc494daf350d769a568d92773b4f2bcd8522621b8cd90a341958a
-
Filesize
2KB
MD55ad857ee7681dbc3612ca3c7a75cf8ac
SHA1d8dd4acba65814234b4a49c628d3c9af64e82833
SHA256f74280ca18b43fcded518ce228c4cd4bc5882bace93d64f9fa5d5043ccacf7bc
SHA5128f2ab5c30b8d69ecaaf0ee09491b3a74ab214f9194a058b5cd5151832221f97ddc9113e07bafdefa694b715c5b45ccec06f8a1452bd166b27dbd0030f4214d52
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD5dcfc1cf99700d446f23ea7040301a4f7
SHA16c50663b558f389d622d1f410942069256c02e1b
SHA256756eb70c645cccb1cc2432e3be67e4a49be9fd58f444e8e6ee1bcda351a56b9f
SHA512c63dce83e334fc84416c8e0cab7d0e8eab2ebda07c2896c0a1f08e6081cbf1861425455edaeee43b3bb5f8caf90557bfcf1886c3181f7de18a080a4dac9bd551
-
Filesize
1KB
MD5bed9a05dd0e805452700b187335db032
SHA124780293785761f9844924648bb8d1d2593792bc
SHA256d95c6d2a811f60aa7a54574358113bb9d344146da7a89e745742a5787cee0f89
SHA51294edc0ec35d0378ffc80e5d6c8936b049e1971643dfed824aa983c53bc81b6197e590fd0a465dc434acc467db0c2d3ee9e50e5b74eaac002e0912bad582876f7
-
Filesize
10KB
MD5f2ab3d74148a9f165ae3be041c1afcf2
SHA14c46be5dd136294bd2c5a13cfa318446eb070576
SHA256fdbf03c7a01ffbf63849d3da2cbd02f88ffb4229b7ca6b924338d026afc6e164
SHA51284a302b046409a8f91dc71f33afbd1ece87130fbd3faf52e5966d98cb711dff97a137f16316008b79be6008adeb0703a22dabe54b66c62f863a09e65d78d212a
-
Filesize
9KB
MD5915da28781aff49306fabab524b994f0
SHA13a66c26969055a701c6837c1e6d682c2ab406c5f
SHA256eb90f7c1534b3dde010e6eeb2b9d8862459f5fd26e1938c968155aad0c7d32fc
SHA5129485cce5272d25d64929a9f788d1b951185e3b5b5974636c8369ab433a92813f1a1622cb5267449b5f51bb6255cd995b8f2807ce8cca64c65a3c0b81c3dcb788
-
Filesize
9KB
MD5e96286fe28c5cd4746245e8d1ad6e3df
SHA164cb746a9bcb83bede60c5371f6d54fd923a0085
SHA25692889fd990e12bb630a51bb6a88a94d371ade10fb035e8cf7dafc93ad394ecb7
SHA51290fbeacda19442aef4cc9ae5f0d87a18400343e0151b2391b7f5b7d7710194cd07e9b37687dca201270d001b96a6d9b05c06db07ae0ff766ac07256215cee537
-
Filesize
9KB
MD5401b6f556bd00a685df479708ea1e599
SHA1afcf7ca3bbc9e04bda8f012099d1ab37a5dff9f5
SHA2565098a2e321416ad2bb9ff003d503babf7133998fdc8df367a2acd735d1df2a27
SHA512827cb1b6c07606d72bd1ef93aa491f2b78fc964e1677d53f22e2dd5b133fb6d0d0bed848aadd2d0d4985d2e4056f4a1a336ed876db241cafbb90042ecf779717
-
Filesize
9KB
MD540c352520e9593954b0e946480c50411
SHA1586575e5384b7bfbb15c998c10662891e3abc360
SHA2569443b0e3f4731b026ce235878dee1689e7091742f833bcce51d46cd4a23aabbb
SHA5126a1bccd2cd5c83511a23ffc3a2dc0d0c39a84fff8c91bcf3e3c2601f7d3135fffa881007d8b0e3d5260cd628d89af9ff72df9149be053763636b445258103ec5
-
Filesize
228KB
MD5297a1371dc4c6adea994691434eef4b0
SHA1c3bfa39007dcce549c9c038e0988f8d0a9d275e7
SHA256e3b3ae8bf34bf1eb4305672f995d944cf4c36dd2835dde58457972d127c695ee
SHA5123f2f3b949d755414cf78ace682c5de0f37b5213665cb2a6ba4e253e576101a0752b6425f65abeb32b4c22c0caebe231b272e7a5af889ee53904effd090e0db2d
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84