Analysis
-
max time kernel
185s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:37
Static task
static1
Behavioral task
behavioral1
Sample
fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe
Resource
win10v2004-20221111-en
General
-
Target
fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe
-
Size
844KB
-
MD5
5a1a76f5d6652816ec4bcb7cabead9a4
-
SHA1
150b6d0ce62b21a0b99e850c392b35c620360d99
-
SHA256
fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581
-
SHA512
ee9042b2e7cabc361701c131ead0f8eb1061639c90a5d01d77b54ab1e4c9cd018831607408d2fada544605f70e24a6bd2895464d695016fc44b11da06e9c2c32
-
SSDEEP
24576:9TSeM/uDIUuEPFQE+mYeg/Sia3aaBPJWxMjg:VCuDIUlPFv+mY36F9BP5jg
Malware Config
Extracted
darkcomet
Guest16_min
markgraham.noip.me:2124
DCMIN_MUTEX-FUSP59W
-
gencode
Le3UD9gfvz8p
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
WUDHost.exeAcctres.exeWUDHost.exepid process 3488 WUDHost.exe 4500 Acctres.exe 3516 WUDHost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exeAcctres.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation Acctres.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
WUDHost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Boot File Servicing Utility = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\WUDHost.exe" WUDHost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exeAcctres.exedescription pid process target process PID 4324 set thread context of 4712 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe vbc.exe PID 4500 set thread context of 4220 4500 Acctres.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exepid process 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe -
Suspicious use of AdjustPrivilegeToken 55 IoCs
Processes:
fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exevbc.exeWUDHost.exeAcctres.exevbc.exedescription pid process Token: SeDebugPrivilege 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe Token: 33 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe Token: SeIncBasePriorityPrivilege 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe Token: SeIncreaseQuotaPrivilege 4712 vbc.exe Token: SeSecurityPrivilege 4712 vbc.exe Token: SeTakeOwnershipPrivilege 4712 vbc.exe Token: SeLoadDriverPrivilege 4712 vbc.exe Token: SeSystemProfilePrivilege 4712 vbc.exe Token: SeSystemtimePrivilege 4712 vbc.exe Token: SeProfSingleProcessPrivilege 4712 vbc.exe Token: SeIncBasePriorityPrivilege 4712 vbc.exe Token: SeCreatePagefilePrivilege 4712 vbc.exe Token: SeBackupPrivilege 4712 vbc.exe Token: SeRestorePrivilege 4712 vbc.exe Token: SeShutdownPrivilege 4712 vbc.exe Token: SeDebugPrivilege 4712 vbc.exe Token: SeSystemEnvironmentPrivilege 4712 vbc.exe Token: SeChangeNotifyPrivilege 4712 vbc.exe Token: SeRemoteShutdownPrivilege 4712 vbc.exe Token: SeUndockPrivilege 4712 vbc.exe Token: SeManageVolumePrivilege 4712 vbc.exe Token: SeImpersonatePrivilege 4712 vbc.exe Token: SeCreateGlobalPrivilege 4712 vbc.exe Token: 33 4712 vbc.exe Token: 34 4712 vbc.exe Token: 35 4712 vbc.exe Token: 36 4712 vbc.exe Token: SeDebugPrivilege 3488 WUDHost.exe Token: SeDebugPrivilege 4500 Acctres.exe Token: 33 4500 Acctres.exe Token: SeIncBasePriorityPrivilege 4500 Acctres.exe Token: SeIncreaseQuotaPrivilege 4220 vbc.exe Token: SeSecurityPrivilege 4220 vbc.exe Token: SeTakeOwnershipPrivilege 4220 vbc.exe Token: SeLoadDriverPrivilege 4220 vbc.exe Token: SeSystemProfilePrivilege 4220 vbc.exe Token: SeSystemtimePrivilege 4220 vbc.exe Token: SeProfSingleProcessPrivilege 4220 vbc.exe Token: SeIncBasePriorityPrivilege 4220 vbc.exe Token: SeCreatePagefilePrivilege 4220 vbc.exe Token: SeBackupPrivilege 4220 vbc.exe Token: SeRestorePrivilege 4220 vbc.exe Token: SeShutdownPrivilege 4220 vbc.exe Token: SeDebugPrivilege 4220 vbc.exe Token: SeSystemEnvironmentPrivilege 4220 vbc.exe Token: SeChangeNotifyPrivilege 4220 vbc.exe Token: SeRemoteShutdownPrivilege 4220 vbc.exe Token: SeUndockPrivilege 4220 vbc.exe Token: SeManageVolumePrivilege 4220 vbc.exe Token: SeImpersonatePrivilege 4220 vbc.exe Token: SeCreateGlobalPrivilege 4220 vbc.exe Token: 33 4220 vbc.exe Token: 34 4220 vbc.exe Token: 35 4220 vbc.exe Token: 36 4220 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vbc.exepid process 4712 vbc.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exeWUDHost.exeAcctres.exedescription pid process target process PID 4324 wrote to memory of 4712 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe vbc.exe PID 4324 wrote to memory of 4712 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe vbc.exe PID 4324 wrote to memory of 4712 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe vbc.exe PID 4324 wrote to memory of 4712 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe vbc.exe PID 4324 wrote to memory of 4712 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe vbc.exe PID 4324 wrote to memory of 4712 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe vbc.exe PID 4324 wrote to memory of 4712 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe vbc.exe PID 4324 wrote to memory of 4712 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe vbc.exe PID 4324 wrote to memory of 4712 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe vbc.exe PID 4324 wrote to memory of 4712 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe vbc.exe PID 4324 wrote to memory of 4712 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe vbc.exe PID 4324 wrote to memory of 4712 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe vbc.exe PID 4324 wrote to memory of 3488 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe WUDHost.exe PID 4324 wrote to memory of 3488 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe WUDHost.exe PID 4324 wrote to memory of 3488 4324 fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe WUDHost.exe PID 3488 wrote to memory of 4500 3488 WUDHost.exe Acctres.exe PID 3488 wrote to memory of 4500 3488 WUDHost.exe Acctres.exe PID 3488 wrote to memory of 4500 3488 WUDHost.exe Acctres.exe PID 4500 wrote to memory of 4220 4500 Acctres.exe vbc.exe PID 4500 wrote to memory of 4220 4500 Acctres.exe vbc.exe PID 4500 wrote to memory of 4220 4500 Acctres.exe vbc.exe PID 4500 wrote to memory of 4220 4500 Acctres.exe vbc.exe PID 4500 wrote to memory of 4220 4500 Acctres.exe vbc.exe PID 4500 wrote to memory of 4220 4500 Acctres.exe vbc.exe PID 4500 wrote to memory of 4220 4500 Acctres.exe vbc.exe PID 4500 wrote to memory of 4220 4500 Acctres.exe vbc.exe PID 4500 wrote to memory of 4220 4500 Acctres.exe vbc.exe PID 4500 wrote to memory of 4220 4500 Acctres.exe vbc.exe PID 4500 wrote to memory of 4220 4500 Acctres.exe vbc.exe PID 4500 wrote to memory of 4220 4500 Acctres.exe vbc.exe PID 4500 wrote to memory of 3516 4500 Acctres.exe WUDHost.exe PID 4500 wrote to memory of 3516 4500 Acctres.exe WUDHost.exe PID 4500 wrote to memory of 3516 4500 Acctres.exe WUDHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe"C:\Users\Admin\AppData\Local\Temp\fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4712
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Acctres.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\WUDHost.exe"4⤵
- Executes dropped EXE
PID:3516
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD5c19eb8c8e7a40e6b987f9d2ee952996e
SHA16fc3049855bc9100643e162511673c6df0f28bfb
SHA256677e9e30350df17e2bc20fa9f7d730e9f7cc6e870d6520a345f5f7dc5b31f58a
SHA512860713b4a787c2189ed12a47d4b68b60ac00c7a253cae52dd4eb9276dacafeae3a81906b6d0742c8ecfdfaa255777c445beb7c2a532f3c677a9903237ac97596
-
Filesize
844KB
MD55a1a76f5d6652816ec4bcb7cabead9a4
SHA1150b6d0ce62b21a0b99e850c392b35c620360d99
SHA256fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581
SHA512ee9042b2e7cabc361701c131ead0f8eb1061639c90a5d01d77b54ab1e4c9cd018831607408d2fada544605f70e24a6bd2895464d695016fc44b11da06e9c2c32
-
Filesize
844KB
MD55a1a76f5d6652816ec4bcb7cabead9a4
SHA1150b6d0ce62b21a0b99e850c392b35c620360d99
SHA256fba71d7e42c54406f33bfc7fb376513f3a3a5e6056e93567117c51b919a18581
SHA512ee9042b2e7cabc361701c131ead0f8eb1061639c90a5d01d77b54ab1e4c9cd018831607408d2fada544605f70e24a6bd2895464d695016fc44b11da06e9c2c32
-
Filesize
8KB
MD5203abaf3a0b4387f8c83b8df44b52be4
SHA1f298f77bf98b2941d4c7473c8fe0e8feedaaca6f
SHA2564b5118a6792cf0fec015c0db676d42049333f725f9d10f4d36df95a41003ae38
SHA512475e350bca4c5273779fe58e17bfe18a713572e17e417f700aa6418196c2830ae003f7fa9f8eb956ebea06e32fe35b47e967d5f1bff9b3a920585562360b0b50
-
Filesize
8KB
MD5203abaf3a0b4387f8c83b8df44b52be4
SHA1f298f77bf98b2941d4c7473c8fe0e8feedaaca6f
SHA2564b5118a6792cf0fec015c0db676d42049333f725f9d10f4d36df95a41003ae38
SHA512475e350bca4c5273779fe58e17bfe18a713572e17e417f700aa6418196c2830ae003f7fa9f8eb956ebea06e32fe35b47e967d5f1bff9b3a920585562360b0b50
-
Filesize
8KB
MD5203abaf3a0b4387f8c83b8df44b52be4
SHA1f298f77bf98b2941d4c7473c8fe0e8feedaaca6f
SHA2564b5118a6792cf0fec015c0db676d42049333f725f9d10f4d36df95a41003ae38
SHA512475e350bca4c5273779fe58e17bfe18a713572e17e417f700aa6418196c2830ae003f7fa9f8eb956ebea06e32fe35b47e967d5f1bff9b3a920585562360b0b50
-
Filesize
8KB
MD5203abaf3a0b4387f8c83b8df44b52be4
SHA1f298f77bf98b2941d4c7473c8fe0e8feedaaca6f
SHA2564b5118a6792cf0fec015c0db676d42049333f725f9d10f4d36df95a41003ae38
SHA512475e350bca4c5273779fe58e17bfe18a713572e17e417f700aa6418196c2830ae003f7fa9f8eb956ebea06e32fe35b47e967d5f1bff9b3a920585562360b0b50