Resubmissions
09-05-2024 20:23
240509-y58y4afh39 103-05-2024 11:30
240503-nl9feafd78 1003-05-2024 11:28
240503-nlhbxsfd55 403-05-2024 11:25
240503-nh81gadc71 10Analysis
-
max time kernel
1860s -
max time network
1806s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 20:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/Ransomware
Resource
win10v2004-20240508-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/Ransomware
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133597598283014566" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 3228 chrome.exe 3228 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1292 chrome.exe 1292 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe Token: SeShutdownPrivilege 1292 chrome.exe Token: SeCreatePagefilePrivilege 1292 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe 1292 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1404 1292 chrome.exe 81 PID 1292 wrote to memory of 1404 1292 chrome.exe 81 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 432 1292 chrome.exe 84 PID 1292 wrote to memory of 4496 1292 chrome.exe 85 PID 1292 wrote to memory of 4496 1292 chrome.exe 85 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86 PID 1292 wrote to memory of 4316 1292 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/tree/master/Ransomware1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ff8ace8ab58,0x7ff8ace8ab68,0x7ff8ace8ab782⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1916,i,8274792109594013387,528419104649555102,131072 /prefetch:22⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1916,i,8274792109594013387,528419104649555102,131072 /prefetch:82⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2076 --field-trial-handle=1916,i,8274792109594013387,528419104649555102,131072 /prefetch:82⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3080 --field-trial-handle=1916,i,8274792109594013387,528419104649555102,131072 /prefetch:12⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1916,i,8274792109594013387,528419104649555102,131072 /prefetch:12⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4408 --field-trial-handle=1916,i,8274792109594013387,528419104649555102,131072 /prefetch:82⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1916,i,8274792109594013387,528419104649555102,131072 /prefetch:82⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 --field-trial-handle=1916,i,8274792109594013387,528419104649555102,131072 /prefetch:82⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1916,i,8274792109594013387,528419104649555102,131072 /prefetch:82⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1916,i,8274792109594013387,528419104649555102,131072 /prefetch:82⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1916,i,8274792109594013387,528419104649555102,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51a692365954975a46cddb7f2eb8216bf
SHA17f203182796f92f5c2b35b6a0ed179aba2cc9027
SHA256cab9334459cb8a083b83374c6b15fc8ab0321f6e52d8072a452caa7fb2f0aa94
SHA512a8fae406538ab0fae65001316c6fc1ebc243ed22b5df7314ce752a02e89bab9c1c215b6e3fbc684948e3717d744fd1ee27631ec659cdf79d518d7eb1a5b2f2f5
-
Filesize
2KB
MD58c41c0fd4dbafebcc852f12c2153013a
SHA1dd0bc3dfefe8b1ab9142cf6e2dc7f316c0c9bfdb
SHA256a58a1047606507a7815de0d9454f44c5ff577fe5a553ea841e59035cd3539d4f
SHA512cce98692a025083f57c90e9801c2c6a8b31a2861914cbc14cd1749fad3186435f44b399fb0d877d44f40c3cc54d386b3aff5a0d2d1eb730b4fe40911a610c608
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD55cccebdebe8fdbdd08a4c9079f45e3c4
SHA11c1f83da27b7e4add124a8aaf219d9847bb140d7
SHA256f564c8bee7186ea2ce89de0ae786749905bb659a76d44e5d4b6e3bce356bd927
SHA512aa74c8304c3dcd10cf5b25e9e3b61118351054f63fba197ba188caa4d5498335c3e5697736c6105b67bafa1189d488f587ab970e5b9642211525a02b35bb360d
-
Filesize
7KB
MD5fccc460f3b15684804f6702f7ef0b6e7
SHA1e432da1c0e182a1f65055eaecc7adf663e345364
SHA25643558a1dc6be52ed929b2df90370790033c4af4551cd45cc02ddbb23641aaa76
SHA512e5c65349b0930db6b2bb67c218d881660681435eef1926476ed6098b83da5777706e75d5940ebd4e758654f81c1398bc50a42b5f79ba33538fb0a3f00c9adb4e
-
Filesize
257KB
MD58c02277cf8538087440e250eaa6c2e2a
SHA105c074a2f6e02bf90cff9164f40361bfc773b1d2
SHA2567a4e08bb19e05c5b90034b985dc54a9409129caa74fa2e6d8bbd608df3f9e7b1
SHA512c496e95e55f99b50f72f1a466161db3ece7bdd2e4e51b282caeaffaad6d78b0fe0d430901dc4bd08e9d6ee89eb2f19bdf9227eee3ed8af0cf2da0ef709c35d98
-
Filesize
277KB
MD5d65c38cdc50311dce3a3175104de388a
SHA19c5e76f933371c80026ace1cfec2cbc67da8435a
SHA2562072a6a9ac1d85d7abb772497f8ef4bfcf5e22ac5af2073b1a192eef150ca40a
SHA5123347c9319e95254028d3bf73994a5964bc2619b52c24ff8250a1b04cb3310461ee3f2edf0aac98cfdffc6e5846010e59502ff05bec9a242f62c6f13940173793
-
Filesize
257KB
MD55249ed4d8c00b7a910f6c0a77a40cae7
SHA150173c5418951bb2535bc22de9bf45acb8b6fa98
SHA256ce82da2303670e666140bfedd4b4a30ea12c19dac76e2914c298f3774e1985b8
SHA512e39cf6a97703f9454fad8469f903da1e464772da743c0985dbe53513360889b8a7390a4b29160e0051c18cf92ac4211e6d2731333d3583465db72aa7827cfb19
-
Filesize
257KB
MD5ae717c54d71c95f093026b4d0dcbdb8c
SHA19a1136978e0b416c12bc062603ecdb219e4310ca
SHA256c1da5e9c22f1f1912f9697183c52d924d6dc14d33b1402eea2471992f7b75236
SHA512d0a1a9d0a20abeb8b4cd9df31f6a50b9a1d7a86ae93a9fd6902363b31ee8a1106390b6d0b5f2a50ee6a8e55a3a95f8c060429350b2d89131f22efd800e8748fc
-
Filesize
90KB
MD5ced02618bfd15a022e5ae55e7a040d54
SHA1084ffe3944f0aba0885cc706da40082195b4faf3
SHA25653e90350107abfbdc03e6d3355c0225f31f23b9e101cdaff498a84a19436abb5
SHA512babd5ff656b868b35f4fcd7e03afd16c6bd6d746189bd49dd0db76065b65d650df937eea1b803b2b2c8a6ae0feba7f032160cdd69f84260300d2218720b1b45c
-
Filesize
87KB
MD53155c017599455834cb303fc5b568109
SHA13bedd9ee42e57981b72a7fbb52f2d209eeb921aa
SHA2569c7f7ee02d355b45578d70be93b902ef5df6b229018d02a27eb1da9334c9783b
SHA512e761f7067dcecaa874d85bb418c8662ae03d85b7ceb2ef192a42674065cf69b22e6ffaade3df96411f32d773b9c173eadd4c9b9c0d2f0701c9b9184f56df1a50