Analysis
-
max time kernel
152s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 02:04
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://b5dyxfslradqqcrears2joaijxljtgtdkiykpn7l6uzwkh24-ipfs-dweb-link.translate.goog/nniOwadd2.html?_x_tr_hp=bafybeig2va&_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp#[email protected]
Resource
win10v2004-20230221-en
General
-
Target
https://b5dyxfslradqqcrears2joaijxljtgtdkiykpn7l6uzwkh24-ipfs-dweb-link.translate.goog/nniOwadd2.html?_x_tr_hp=bafybeig2va&_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133240143048278559" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 840 chrome.exe 840 chrome.exe 4480 chrome.exe 4480 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 840 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe Token: SeShutdownPrivilege 840 chrome.exe Token: SeCreatePagefilePrivilege 840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe 840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 840 wrote to memory of 4436 840 chrome.exe chrome.exe PID 840 wrote to memory of 4436 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 116 840 chrome.exe chrome.exe PID 840 wrote to memory of 1548 840 chrome.exe chrome.exe PID 840 wrote to memory of 1548 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe PID 840 wrote to memory of 2692 840 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://b5dyxfslradqqcrears2joaijxljtgtdkiykpn7l6uzwkh24-ipfs-dweb-link.translate.goog/nniOwadd2.html?_x_tr_hp=bafybeig2va&_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb0009758,0x7ffcb0009768,0x7ffcb00097782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1816,i,2581647381579702932,11676894715004830789,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1816,i,2581647381579702932,11676894715004830789,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1816,i,2581647381579702932,11676894715004830789,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1816,i,2581647381579702932,11676894715004830789,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3200 --field-trial-handle=1816,i,2581647381579702932,11676894715004830789,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4604 --field-trial-handle=1816,i,2581647381579702932,11676894715004830789,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 --field-trial-handle=1816,i,2581647381579702932,11676894715004830789,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5264 --field-trial-handle=1816,i,2581647381579702932,11676894715004830789,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=1816,i,2581647381579702932,11676894715004830789,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2812 --field-trial-handle=1816,i,2581647381579702932,11676894715004830789,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
552B
MD56c0bfd28d9f493b344e815109f4fa599
SHA1db8a6ee8a97ca3cdd575d01450e6cf85b1f39b2c
SHA25666ae6b2fd961d2d64336c894ac8160091e37e73038a8660bf0651b315e5b0959
SHA5123650883b89ecd7c2ffb3f76659afc86aa3d0a8b4c0f32def5c69dacc51e31c9e87036b54bc820d4407ef5461af4e447fb874e158ac26bf81fbcc973d931576ef
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
4KB
MD57e4cea8c0f915dbf32669b8b5aa88959
SHA1f3a268d2360d789e319e5b65bb3cdc072ece2607
SHA2564649d1a920e0f16bf681336e31335fbbc0bea2db65e5ba3bfa2c4201b5ad143b
SHA512733ff3675e975b0500eab6ba93b5acaff2ecf385c62269a3958ac01b5d5dd38cfa844b2d269cd72950903abc031fdd7dd24123184ec752f568b9439a9f4b210f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD5a029338b1e2e148748e121ee8af86962
SHA11c188836977b2e28906faf3cdff0fbebc831c1b7
SHA25604f6cdd933d54acb0c209412af6053ae080168b98f8444ba9edfd9e7b28f2f82
SHA5122728dd2674f6144610ff74262a24a02e77e71812b9c4ad9d9bf3fb869516f7f4d3070ee0d5a22fb943907d9d5c770d440a7c0b842d0236c04507cb1864d83568
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5fe810bce8c573c3787230ad4b0ac0476
SHA1b316cc9634ab1aa1d70f017141ec5dcad2869e68
SHA2568032a15577d5fecb1f52607657112d65551491db395fa61ce84640216616f87b
SHA512a47c529b8acd5be9fd9eaef6375c85a92528db9eb1a2e579512341448003d1bc387f3df8c14e52a43fb4ba7faa0d23ae81683b9aa0ca0770d4f8c4a1de52cd8f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5047aa90fb20aebd1f9a1cd67755b2ec5
SHA198ddce170329d03aa6808f4936241b1ba0f33e5c
SHA256d2323806f70ee0b7059ecd4ab77df8ac02a6a9d6016a26f65e4eaa4c2fbf31e9
SHA512b74f45345860c4a1646effe009e1efac52f47c3b2ba55e13ae6945ca8f39e169269130a8084ea601f0134ef1615a274f7d12afef53f93159c396f0e1ba36e024
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD58464ed8c85ecc32fc308645726254c54
SHA157679eac1b0a2b76bca3048558ed5b382433f066
SHA256160623539d90379fe4d48b33886efa7baa96e421a2da236e3a23079e7d178e17
SHA5123e5ca644155d62b10f2fe46273f069ee25e207821ceaa7bee06fa1abf136f8e87f8539dee7c451d9c1623b16a988f055ef23620762e6693f5604c811738091eb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD58a8c9f819e67bc7c05c7ebde64b5bde8
SHA14030bf15211b7fa5b9f9a788fb324c07761e90d2
SHA2563f4baa014e96b7ab4f479a1f68818ff1ac8f096577b265f230db8d16a1abe5be
SHA5121f7f7c8ffd298ec5086625647fd75c7d35bfb4c5de075de9f6ac281dcac96a4d485a6d2d799409aa55efa3e645497b94a23ed70b8603b2cdb1c3e8e798458bb2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_840_ZFDUEBGEDFCUUOLDMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e