Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
Ch Payment.html
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Ch Payment.html
Resource
win10v2004-20220901-en
General
-
Target
Ch Payment.html
-
Size
4KB
-
MD5
e6e1b3f4c89df7c871e9bb1126017747
-
SHA1
1db9d30dbec52bd5ebbe4f9e4606a0ff7b6b4f91
-
SHA256
1c1b585bf5f3e249afee0144cdb607ec90ae23652af0236ee1ead0d682291ada
-
SHA512
f318d11bf54e739122d478413330af7635727fa6e05e44a30a497dc3c875b7c218a6fe07b444a8c36df262ade57b54ce88f2a0af0fb3c3d3e11453d32fe8f95f
-
SSDEEP
96:/wNPvtA8MwTlN6f9jjOpJSfyQIfzUUm8qYPYzD0gcYnThF70gR6U/:/wNXtnTlN6fljOpjhqYPYkgcYnThZR/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c0000000002000000000010660000000100002000000086b2c00be6c184567096a8ed8c1d64e3ee2805a1fc61a8a01d47374cc7e81f86000000000e800000000200002000000072cba4835f3a9ce5be561cb2f9634d968442091788894714e9fd3bd65596693d20000000d861c5271ca93d5019249db70f5718fee8ea37bd99b13d1351f591106c707d5a40000000794616d14e3e3087870dcba95d684489bd348b21f01ac213c0f54765a4f3ba66b2abdb3a72ed767071fdbea0776799c269f1062655e0597afa66dc3a5fa8d66e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7059fe86fdddd801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{85219270-49F0-11ED-9332-6A94EDCEDC7A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372318278" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c000000000200000000001066000000010000200000000ba43a1bd1a61168972908278df784c9b92f2c30ec42f0fbc782cf5ae99a8d5d000000000e80000000020000200000000c32a9904e62b91f6e3459b93d5f290a1e8a8e852cbbb5b1a02efcdc4a03557b90000000a6d20d981276253474427ffb7bf2c946a8bdc5077f090521fc47de2edd5f6ba4f8d08a63152551f821e0614d6ba0667e334d7f13aafe9f82dad1fff74311a70c6182532d2aa323b46c6dde44125338f1a53432fe01b7ae2cfe9274c88fd1732e39cf35053b9f40f507a0f86d13d5495a2ddce37c2d18d2af82e600290af308eb076dd80795f765816706d6d120bd3565400000001a2a26bd2c31de1bbab67b18da3546ccffc17af0063c49fd5d7325b4d4f553b720cc14360657134657ff53b9342e61940e8cc106c4a1710b9324f32ec29b8d32 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 684 chrome.exe 1084 chrome.exe 1084 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 856 iexplore.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe 1084 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 856 iexplore.exe 856 iexplore.exe 1604 IEXPLORE.EXE 1604 IEXPLORE.EXE 1604 IEXPLORE.EXE 1604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 856 wrote to memory of 1604 856 iexplore.exe 27 PID 856 wrote to memory of 1604 856 iexplore.exe 27 PID 856 wrote to memory of 1604 856 iexplore.exe 27 PID 856 wrote to memory of 1604 856 iexplore.exe 27 PID 1084 wrote to memory of 556 1084 chrome.exe 30 PID 1084 wrote to memory of 556 1084 chrome.exe 30 PID 1084 wrote to memory of 556 1084 chrome.exe 30 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 1864 1084 chrome.exe 31 PID 1084 wrote to memory of 684 1084 chrome.exe 32 PID 1084 wrote to memory of 684 1084 chrome.exe 32 PID 1084 wrote to memory of 684 1084 chrome.exe 32 PID 1084 wrote to memory of 544 1084 chrome.exe 33 PID 1084 wrote to memory of 544 1084 chrome.exe 33 PID 1084 wrote to memory of 544 1084 chrome.exe 33 PID 1084 wrote to memory of 544 1084 chrome.exe 33 PID 1084 wrote to memory of 544 1084 chrome.exe 33 PID 1084 wrote to memory of 544 1084 chrome.exe 33 PID 1084 wrote to memory of 544 1084 chrome.exe 33 PID 1084 wrote to memory of 544 1084 chrome.exe 33 PID 1084 wrote to memory of 544 1084 chrome.exe 33 PID 1084 wrote to memory of 544 1084 chrome.exe 33 PID 1084 wrote to memory of 544 1084 chrome.exe 33 PID 1084 wrote to memory of 544 1084 chrome.exe 33 PID 1084 wrote to memory of 544 1084 chrome.exe 33
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\Ch Payment.html"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb064f50,0x7fefb064f60,0x7fefb064f702⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1068,2783891093397015493,4736237169417245869,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1100 /prefetch:22⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1068,2783891093397015493,4736237169417245869,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1068,2783891093397015493,4736237169417245869,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1648 /prefetch:82⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1068,2783891093397015493,4736237169417245869,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2032 /prefetch:12⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1068,2783891093397015493,4736237169417245869,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2152 /prefetch:12⤵PID:596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,2783891093397015493,4736237169417245869,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1068,2783891093397015493,4736237169417245869,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3376 /prefetch:22⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1068,2783891093397015493,4736237169417245869,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:2240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,2783891093397015493,4736237169417245869,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3560 /prefetch:82⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1068,2783891093397015493,4736237169417245869,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3588 /prefetch:82⤵PID:2316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
606B
MD500975b79d8769a01508acf0ec386bab9
SHA11b2b9f10dac2ec484b853b12a581ed71215777aa
SHA256178d42322ba548a6d2da35d1df5ed75782cdbc384747a450b61ec351b8b9354a
SHA512959432bb1406e1acf6604da6aae32f3dd996aa24c881d74e335d22a3be8d2a331d9707cfc1be0092fed998ed40cfa1a51fd8e7b33c5c6dc58bf31f1f0817f9a9