Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2023 04:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://app.hauntpay.com/users/confirmation?confirmation_token=zZt7hB9uo3zSFACzR2xy
Resource
win10v2004-20231020-en
General
-
Target
https://app.hauntpay.com/users/confirmation?confirmation_token=zZt7hB9uo3zSFACzR2xy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133431138999299015" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1096 chrome.exe 1096 chrome.exe 5264 chrome.exe 5264 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: 33 1808 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1808 AUDIODG.EXE Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe Token: SeShutdownPrivilege 1096 chrome.exe Token: SeCreatePagefilePrivilege 1096 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe 1096 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1096 wrote to memory of 4996 1096 chrome.exe 70 PID 1096 wrote to memory of 4996 1096 chrome.exe 70 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 5032 1096 chrome.exe 88 PID 1096 wrote to memory of 1492 1096 chrome.exe 89 PID 1096 wrote to memory of 1492 1096 chrome.exe 89 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90 PID 1096 wrote to memory of 2280 1096 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://app.hauntpay.com/users/confirmation?confirmation_token=zZt7hB9uo3zSFACzR2xy1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa47d79758,0x7ffa47d79768,0x7ffa47d797782⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1828,i,3618734828461656967,16423690826250934069,131072 /prefetch:22⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1828,i,3618734828461656967,16423690826250934069,131072 /prefetch:82⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1828,i,3618734828461656967,16423690826250934069,131072 /prefetch:82⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2860 --field-trial-handle=1828,i,3618734828461656967,16423690826250934069,131072 /prefetch:12⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2868 --field-trial-handle=1828,i,3618734828461656967,16423690826250934069,131072 /prefetch:12⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4996 --field-trial-handle=1828,i,3618734828461656967,16423690826250934069,131072 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4896 --field-trial-handle=1828,i,3618734828461656967,16423690826250934069,131072 /prefetch:82⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4976 --field-trial-handle=1828,i,3618734828461656967,16423690826250934069,131072 /prefetch:12⤵PID:364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5416 --field-trial-handle=1828,i,3618734828461656967,16423690826250934069,131072 /prefetch:12⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5816 --field-trial-handle=1828,i,3618734828461656967,16423690826250934069,131072 /prefetch:12⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6400 --field-trial-handle=1828,i,3618734828461656967,16423690826250934069,131072 /prefetch:82⤵PID:5312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 --field-trial-handle=1828,i,3618734828461656967,16423690826250934069,131072 /prefetch:82⤵PID:5392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3704 --field-trial-handle=1828,i,3618734828461656967,16423690826250934069,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5264
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5040
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3fc 0x5081⤵
- Suspicious use of AdjustPrivilegeToken
PID:1808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5990324ce59f0281c7b36fb9889e8887f
SHA135abc926cbea649385d104b1fd2963055454bf27
SHA25667bcedd3040fc55d968bbe21df05c02b731181541aff4ae72b9205300a4a3ecc
SHA51231e83da1ac217d25be6e7f35a041881b926f731fff69db6f144e4fe99b696a31f9ab7766ca22cf5a482743c2a2d00a699ca2c2d67837a86c471a2dd3bed9ea1f
-
Filesize
1KB
MD53369368d51011b1c840dfbb25702b828
SHA11bb8b6ec3c0b5779c0af0dd9b4123daccddfdb6d
SHA25654b8c237a8ef64977fd06d4f21cb3eb68dc43ce8fa98d2c0bb0bfc56c3915ba7
SHA51253097bdc9d47397851b350afb25795569b020d3e1f1d91f9368018a0e952adc190873b14fdf376aad817c6468c961f8a91755fb6ddaeb533a8cf3e8bbed45438
-
Filesize
5KB
MD5980efd2eb583095f7f052d0f0927a72a
SHA1dd98e22e1e06e5122313c54a0aae80c7f4def498
SHA256a4f5683198c1660322470c0deb87bb3ff579c4ae7b838fe5923fa011fc34c217
SHA512048b5f1d630fd21ee9e60717f61dabe288ad0bd944a7ee5bb5161eea2bb84342ef332ed4f1b940259792a896c424cb1ebe0675318f6a576dff419a602dc2ffba
-
Filesize
2KB
MD5292b7a52c1fbf6bd4313fcdcccf12701
SHA1f79e78cdcd6892b485eeadb31450e858950e34f3
SHA256a984369e54c86f352f7cf575b3c7682e3fa2e2cf9cae0258e7e02210e9a43346
SHA5129f9eb4fc9e344c6c186553ed67461f094b04a789317788e26e86cf41d326e2a8fb88d455d2845785ef35a28688b1c507f307a11c27688bd510a148f4334da257
-
Filesize
6KB
MD5d8db5d10b996ae4653c015af80613efe
SHA132893a689154779ba0f6d74614854813a1bfb53c
SHA2568493a7b38f7923713d5ed9a778888151bd6cd214956101a7728b005d86dda1c1
SHA5126d80b411d3358d10632ea18926bc40e69badafc7acecdcd52fcb6f1d1e6017e64df8d8d9d30226ce89f2fe0d840da0cd06932cb963a887ca023640df4160377f
-
Filesize
109KB
MD55e66eac913c307b3ca3f92eaa0964d6b
SHA1445e5fa08f439f6128a91c2f7eabda83a0e86fc5
SHA2562179215875731f89f5102e14e18aa596cbc79fb33acae833d83242ca9da636e5
SHA512ec12cd9ae456dac492501180fbad95488413edec85500bebb2138a34df74162d1fad50cf691fb812800985e2e8ba227fda4e7eaeea53926c1f9337284dc1b924
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84