Overview
overview
4Static
static
1URLScan
urlscan
1https://crypto-o.cli...
windows10-1703-x64
1https://crypto-o.cli...
windows7-x64
1https://crypto-o.cli...
windows10-2004-x64
1https://crypto-o.cli...
windows11-21h2-x64
1https://crypto-o.cli...
android-10-x64
1https://crypto-o.cli...
android-11-x64
1https://crypto-o.cli...
android-13-x64
1https://crypto-o.cli...
android-9-x86
1https://crypto-o.cli...
macos-10.15-amd64
https://crypto-o.cli...
debian-12-armhf
https://crypto-o.cli...
debian-12-mipsel
https://crypto-o.cli...
debian-9-armhf
https://crypto-o.cli...
debian-9-mips
https://crypto-o.cli...
debian-9-mipsel
https://crypto-o.cli...
ubuntu-18.04-amd64
3https://crypto-o.cli...
ubuntu-20.04-amd64
4https://crypto-o.cli...
ubuntu-22.04-amd64
1https://crypto-o.cli...
ubuntu-24.04-amd64
1Analysis
-
max time kernel
99s -
max time network
97s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-06-2024 16:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://crypto-o.click/K1XP8K
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://crypto-o.click/K1XP8K
Resource
win7-20240419-en
Behavioral task
behavioral3
Sample
https://crypto-o.click/K1XP8K
Resource
win10v2004-20240611-en
Behavioral task
behavioral4
Sample
https://crypto-o.click/K1XP8K
Resource
win11-20240611-en
Behavioral task
behavioral5
Sample
https://crypto-o.click/K1XP8K
Resource
android-x64-20240611.1-en
Behavioral task
behavioral6
Sample
https://crypto-o.click/K1XP8K
Resource
android-x64-arm64-20240611.1-en
Behavioral task
behavioral7
Sample
https://crypto-o.click/K1XP8K
Resource
android-33-x64-arm64-20240611.1-en
Behavioral task
behavioral8
Sample
https://crypto-o.click/K1XP8K
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral9
Sample
https://crypto-o.click/K1XP8K
Resource
macos-20240611-en
Behavioral task
behavioral10
Sample
https://crypto-o.click/K1XP8K
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral11
Sample
https://crypto-o.click/K1XP8K
Resource
debian12-mipsel-20240418-en
Behavioral task
behavioral12
Sample
https://crypto-o.click/K1XP8K
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral13
Sample
https://crypto-o.click/K1XP8K
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral14
Sample
https://crypto-o.click/K1XP8K
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral15
Sample
https://crypto-o.click/K1XP8K
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral16
Sample
https://crypto-o.click/K1XP8K
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral17
Sample
https://crypto-o.click/K1XP8K
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral18
Sample
https://crypto-o.click/K1XP8K
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
https://crypto-o.click/K1XP8K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133636349446560340" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 5080 chrome.exe 5080 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 5080 wrote to memory of 4632 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4632 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 2220 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4316 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4316 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe PID 5080 wrote to memory of 4968 5080 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://crypto-o.click/K1XP8K1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff872e19758,0x7ff872e19768,0x7ff872e197782⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1692,i,3875579347941641060,11131140923320477016,131072 /prefetch:22⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2004 --field-trial-handle=1692,i,3875579347941641060,11131140923320477016,131072 /prefetch:82⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1692,i,3875579347941641060,11131140923320477016,131072 /prefetch:82⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2876 --field-trial-handle=1692,i,3875579347941641060,11131140923320477016,131072 /prefetch:12⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=1692,i,3875579347941641060,11131140923320477016,131072 /prefetch:12⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4740 --field-trial-handle=1692,i,3875579347941641060,11131140923320477016,131072 /prefetch:12⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1692,i,3875579347941641060,11131140923320477016,131072 /prefetch:82⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1692,i,3875579347941641060,11131140923320477016,131072 /prefetch:82⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\802a58f6-6fd5-4bb5-8a57-1a5c519d1b5b.tmp
Filesize6KB
MD5418295531e4a65d2fe2e6a96d1b45861
SHA1237544d4004b71e7ecbd01385d4af3866c48ffba
SHA256729c72aaa5f126e9bb1305dee6dca957ddc0b8703bfb0715f639c07e05344668
SHA5123f369286ca4442abf329dbced28bed28961f4a478222658fda24e36780f16432fd5cdd66256981edf5db17aecef5c317dbbda6e25a6b3ff153e68e722e8faf49
-
Filesize
1KB
MD5921bbf25bc5285b22320406afffbaddd
SHA122968acfa53774d34b222eb25a2960839ee95f89
SHA256c985b28bad4183360cb725b500a87c5d7ffdc38e69c88cf1f43645e3b0bc9516
SHA5122f20c1568dacb1536cb73176fe15021784ed7d37cf925cfd6a35e896e2182305bc1922dd5e488b59256bb36f2dec1d28681ffaa5182a4637f308d74202b3f6b1
-
Filesize
6KB
MD53261bfc667b5db4b50dd9d0bfe2123b2
SHA14d41cf482e3c4532ce8f3dbf57606f38b13a1b34
SHA256a86ea051041c99b67a101adcf6772db13caa38cf47eb675388cf7b777e9c6655
SHA512a7dc41625ea4d6afbc54728d0d0371ddb860a7db7a6f0107fbfd611e7bcb1a460f6a28cc03d794033eb5d144cd55e14272d7ae2623a3715221039aa0b7f17864
-
Filesize
6KB
MD50697f7bbd589e4241d20232f22f683d5
SHA15b968d721ac42a5fba62f77f186d816c532311bd
SHA25651a8f5f2e18f91089a6de820daa8411bbea67fab72c71e705fe1cc595865f349
SHA512f4711a9ff0f7e9d2d5a4e569dc5085755d9098b35a400cd0373eef18920558e815e8989be4b7c4f238cb27311e2b597c8bb4bb1124748c1774d088dc8414c0c9
-
Filesize
136KB
MD5303721092554d7de4da9a6dc64f55ba8
SHA1dd6e8addff35e147ad03154f4e615beb486d15a6
SHA256337f5964e352d0ec9e211144f255bf4ffb83ed5c6e1c6f231f8ee0d1be8500a6
SHA5120afec5394e77f2125aec2841b1956584505d84cad47321063d0ed52b79aed85dddb545eee4a3db2ce210ed5ecfb7f8fdd014f0afe525cc54621a45400dfcd6cf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e