Analysis
-
max time kernel
600s -
max time network
594s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 13:18
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.rxjapan.jp/?wptouch_switch=desktop&redirect=https://cnd.com.pk//love/auth/Xcelenergy/[email protected]
Resource
win10v2004-20230220-en
General
-
Target
https://www.rxjapan.jp/?wptouch_switch=desktop&redirect=https://cnd.com.pk//love/auth/Xcelenergy/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133241411268100140" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3176 chrome.exe 3176 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe Token: SeShutdownPrivilege 3176 chrome.exe Token: SeCreatePagefilePrivilege 3176 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe 3176 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3176 wrote to memory of 2396 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 2396 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 4212 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 3676 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 3676 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe PID 3176 wrote to memory of 1916 3176 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.rxjapan.jp/?wptouch_switch=desktop&redirect=https://cnd.com.pk//love/auth/Xcelenergy/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbb429758,0x7ffbbb429768,0x7ffbbb4297782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1808,i,16699261954354396820,5143680759565601637,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1808,i,16699261954354396820,5143680759565601637,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1808,i,16699261954354396820,5143680759565601637,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1808,i,16699261954354396820,5143680759565601637,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1808,i,16699261954354396820,5143680759565601637,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3500 --field-trial-handle=1808,i,16699261954354396820,5143680759565601637,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4888 --field-trial-handle=1808,i,16699261954354396820,5143680759565601637,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3416 --field-trial-handle=1808,i,16699261954354396820,5143680759565601637,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5104 --field-trial-handle=1808,i,16699261954354396820,5143680759565601637,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 --field-trial-handle=1808,i,16699261954354396820,5143680759565601637,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1808,i,16699261954354396820,5143680759565601637,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
192B
MD5e97b09f0723c1c2ab0b36ab6be6eb111
SHA10a8ec8929346172be73fa1aa0e5f66207784c173
SHA256d19585120909c7be338c0896e2f65a2b0b225d8b8db79ed5a8a24916af34eee4
SHA512eb49fe470186ab95f714338182faa8fd78365d3bf516b64980fd5ac0f350e720dfa34b18eda2d8ed0066843759aa8cbd4150a5662299564cce8651a9eec98d53
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD525969c2980f14dbca630855de34ec860
SHA1d1bfe2d529bccbcb01c6781e7399868753afc30c
SHA2561b89556f416d5a755544e108087c1043f9f00672fed53dbb10212a073eb6fe90
SHA512d87aee02a53530f0e747441bc39c43ade2affb88cc478ebf5a658682a6df4dde5d30ddc2a58087414fd7caaaf431d03b712daf825134360c28f79b0cfd77fbce
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
706B
MD5c124a78843625a7f0ecf4123e3de3101
SHA15e5e6f0dc4bc307598609b1349911615911ec6f4
SHA256b08981258efdd9b2f51ddab234e28d2d5131140df7cbbed911b34794138d695a
SHA512dca050707ca47342f8eb49a6ff6faead900772987371b40f62f99f12c8fab044c19da94fab20b1572d5d06f937162492b3546bd373f2981989f74e55f7610e45
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD57ec758ec494b65d457cb1d30de41b990
SHA16b57bbc792cfecf71cbf02127af2283f99735e5e
SHA2561b87970a4f6b83af753293222edc74d569133143fe9405fcfebc92561643273d
SHA51293658c724465e0dc964457f8b9be2ad6a72adda4c96d14e3646c28b9d7bd4312e798f160869f29c879c1762119bb680580d96f77e4d98881d8c27e20ccde716b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5bb2e39c049fb1d24309c71e563237d10
SHA17b12619710891258714b045c265f560908fa7f82
SHA256e3609e6de8534434452ccaa60a4340479d01f0f891b7064b7b601475b0b8948e
SHA5124741d67c2a3de68787c660dcd29393440a617230fb61d1654c607442e5b8ee405869d5d84a7fda2ece964f9488430d03f27ce89e667bf7f2a49940d71eb4de7d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD503962e185210d83e9c9613904d5dd400
SHA1ed0891b4529ad9b60138f6a8de17a699d869d635
SHA2560cc30b7820b5d489a6dcc405be38d6f7fa632721e90c78075a6a6a85d08e1e47
SHA512e2a43357f9fec7fdc99a0c97d6f03d9a7dcb40ee4f7fd8fe2fabb29169e83b43385e91222a46cfaf536f448491b6cf9833b0b7ed81e16e20d61b962c5735cd67
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_3176_SIZYIZMARPHAVOYVMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e