Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 15:52
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://vinaxlcftaut.com/?&qrc=a2VsbGV5LmJyaWdnc0Bzb2RleG8uY29t
Resource
win10v2004-20230220-en
General
-
Target
https://vinaxlcftaut.com/?&qrc=a2VsbGV5LmJyaWdnc0Bzb2RleG8uY29t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133239775678048975" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2984 chrome.exe 2984 chrome.exe 1952 chrome.exe 1952 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exepid process 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe Token: SeShutdownPrivilege 2984 chrome.exe Token: SeCreatePagefilePrivilege 2984 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe 2984 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2984 wrote to memory of 2428 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2428 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3772 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3780 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 3780 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe PID 2984 wrote to memory of 2700 2984 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://vinaxlcftaut.com/?&qrc=a2VsbGV5LmJyaWdnc0Bzb2RleG8uY29t1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa84be9758,0x7ffa84be9768,0x7ffa84be97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1788,i,1536601624236454348,2643536226046144120,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1788,i,1536601624236454348,2643536226046144120,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1788,i,1536601624236454348,2643536226046144120,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1788,i,1536601624236454348,2643536226046144120,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1788,i,1536601624236454348,2643536226046144120,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4492 --field-trial-handle=1788,i,1536601624236454348,2643536226046144120,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4876 --field-trial-handle=1788,i,1536601624236454348,2643536226046144120,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5032 --field-trial-handle=1788,i,1536601624236454348,2643536226046144120,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3328 --field-trial-handle=1788,i,1536601624236454348,2643536226046144120,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3140 --field-trial-handle=1788,i,1536601624236454348,2643536226046144120,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5320 --field-trial-handle=1788,i,1536601624236454348,2643536226046144120,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4492 --field-trial-handle=1788,i,1536601624236454348,2643536226046144120,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
96B
MD516c2c8829766d03366d4baabed82dc3d
SHA15c21372943f358e9dbfc9d994370b5e7d94116e5
SHA25639d747f28a13956d186ddadc20a67713b163fc4c2c96d2be386c4a373fe028cb
SHA512bc77210f6b4ad282c02cdffd9950859bdf3e16dbb7517eb4e59cdad182f9ec81922db34720f986910be43999c771539fe2ba8ce171f893c438c726c8b8e97299
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD581c4be4f82227d63c6b12b5cd676ce0e
SHA12a5f27e8afe8bc6a6256a77bf837a6a975fe2b02
SHA256cd77f2c2e8b0f578d6aca1938171b1243927afd9949c9fd08290e259718c2c15
SHA5128bbf192df64dca5649216722cc8ffe066b4d3a7f11ece30bbff49d9c6e0d04d608d94d581410b6627d897a7f8947b94687a8d100956be540e7cd6cf061c76a24
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
707B
MD5d1e3cc082a9f920f0c5d5fad25631754
SHA1836421247c48cffe8359a869622967a16fce8b71
SHA256bca69ea990c962d4cabbc971682802b3b984f83e20048165b2b69aff7fcdba42
SHA512521d58c6392a940f78538b26b450fbd226fe969addf1044e13e63ea88dfc918e2ec4d6560ff859c5260f0a074919d6491d46f156aa76c31ce0a3ec72cdf05d82
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD53aa835f154b5e84dcbd955592a03b0a3
SHA1ac7efc9707576230eeaf491f0ac612581449118b
SHA256cc763bccdc6324e11d23d0f71457b29faeacabaf56638c2c5495bbca36b3dc05
SHA5128b8ee5e86a1066fa6415c78c78da1ed235cf7bb26cd646c8e368ec933e6400578dc525e8f105d9f6932a6f24a03cb3cdb5579b0f3213d79bac247d2de941566a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5da7c17a555b0092ad90bf5ff8fbadec3
SHA1e5cff37e41e09d8059546b16b34bb843e520c5e1
SHA256d7d5a305a286a3bdd263204f5651826b1d627bd161fa47fb3fc2bb3ee7eba17d
SHA5121492cc95827229d72ebdf96ed551a586f06eee941170c8b079912a9caddc2932b0566fdfea2338081fad5ca98e72df2efda954a3fc984e29df1e5543c242a964
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
71KB
MD5bc7660b0249e77eb7cc401e68f76019c
SHA16ee9c41ebba522f118354381f15830234df7e57b
SHA256b78cabc9af73b9ef66658df6512d4550c5f74e903ee2ebacf3c571647fab4e1b
SHA512e816acc872b612a81c2214ed081bc1f0f177fd7ad147cbf433d7a21a93db5a104d6233902713829662c0216ed284713b363ca6ca6e4084e263ec0f200c0462f6
-
\??\pipe\crashpad_2984_QDMTRWHYYOCHVCESMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e