Analysis
-
max time kernel
83s -
max time network
81s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
14/08/2024, 17:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1qpN1PaXL0MxQEMnfRUxVthpAZKu-sO64/view?usp=sharing
Resource
win10-20240404-en
General
-
Target
https://drive.google.com/file/d/1qpN1PaXL0MxQEMnfRUxVthpAZKu-sO64/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 1 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133681287453104793" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4800 chrome.exe 4800 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: 33 3820 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3820 AUDIODG.EXE Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe Token: SeShutdownPrivilege 4800 chrome.exe Token: SeCreatePagefilePrivilege 4800 chrome.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe 4800 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 696 D.exe 696 D.exe 696 D.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4800 wrote to memory of 1892 4800 chrome.exe 72 PID 4800 wrote to memory of 1892 4800 chrome.exe 72 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 3084 4800 chrome.exe 74 PID 4800 wrote to memory of 4864 4800 chrome.exe 75 PID 4800 wrote to memory of 4864 4800 chrome.exe 75 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76 PID 4800 wrote to memory of 3804 4800 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1qpN1PaXL0MxQEMnfRUxVthpAZKu-sO64/view?usp=sharing1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff90eca9758,0x7ff90eca9768,0x7ff90eca97782⤵PID:1892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1584 --field-trial-handle=1740,i,9783773628079920157,10299479150855700135,131072 /prefetch:22⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1740,i,9783773628079920157,10299479150855700135,131072 /prefetch:82⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2088 --field-trial-handle=1740,i,9783773628079920157,10299479150855700135,131072 /prefetch:82⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1740,i,9783773628079920157,10299479150855700135,131072 /prefetch:12⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1740,i,9783773628079920157,10299479150855700135,131072 /prefetch:12⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4532 --field-trial-handle=1740,i,9783773628079920157,10299479150855700135,131072 /prefetch:12⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4356 --field-trial-handle=1740,i,9783773628079920157,10299479150855700135,131072 /prefetch:12⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 --field-trial-handle=1740,i,9783773628079920157,10299479150855700135,131072 /prefetch:82⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3340 --field-trial-handle=1740,i,9783773628079920157,10299479150855700135,131072 /prefetch:82⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 --field-trial-handle=1740,i,9783773628079920157,10299479150855700135,131072 /prefetch:82⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2024
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2000
-
C:\Users\Admin\Downloads\D\D.exe"C:\Users\Admin\Downloads\D\D.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:696
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1e41⤵
- Suspicious use of AdjustPrivilegeToken
PID:3820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288B
MD5e892fca9dc5c08367cce78fb52741656
SHA11459ba3f16e971c123e022105136d1b1443f45d7
SHA25604883e6af6eb75057cbe2615c9fe526e4a43c0bbaeaf63c708c40495fa2dc4d9
SHA5129aeae413220db0df3b59ecdcbe3174dc129f5c9349c9f6fa01029ae5f68c25b3073684b875c332d3b583b60bc0a663690727ceeb1ba9d84bd20c7bad2fe3e1a7
-
Filesize
3KB
MD501d65d02ce9cd9372bb879a81db62a7d
SHA1051a2aaddfd8a923d054cdece37ad7ea6bbc42ae
SHA2567763fa168f1ce4640d7a2178c530a40eb7a94532a6c137263b99d455356427ef
SHA512660ec26b9b6357c428e767473fe5ea3ceb4f1c902b1074d1e06425b8046b2863dfaa47908f25307ef64da2278801d2ef33e56318f3eed9928bd7692b6f55c567
-
Filesize
1KB
MD5b6ebb78a4cc86f7db6b0a14a8cd9f366
SHA1ff5d4f8c2f7b1fab3d8fc8b9dcb6002a15a25032
SHA2565a9d14167aaeea4ac57ef23f11fb9251c749c708a04bdb9d142677a7ac80f57c
SHA512153a3598a888f2fd6a73dedc505250994540dcf5f3d90b02eee8d19212cf9db590345594194b872c9224327f3c2ce60dfe0bc67d7f395e35eac95d364f2b1491
-
Filesize
6KB
MD5f1e90d13221e70023ec644ad34d1140d
SHA16819c520ba0eb2c6d391256b0919c2307445e0f1
SHA2568b032aad9fe7c1a28f9970717a26d9a45c4edd843c3909364bcacc0e930c91bd
SHA512512b03dcff0a2387ca9ae17891914ebb36af1ed209a7a51139f49b6afcf1c6e832f6a05be559a12259e9d0a0fdc5b5fca2b16fc4652b2d6a794b0e40ee25b155
-
Filesize
6KB
MD5c0aa7567c913b4d63d9c861d6306849b
SHA1fd9bb82081d07af173cf813da924bdbca00a0549
SHA256ecb5faece8390eb49d356c2be386e2e703c5f016f8a679d34ab4efafd0cfe7ac
SHA512671a8bed4e252dd6334e6fcef2437e74fe5d6eb9128241d85c8297d7e01f62397138d9a5d3fcfda0581e8cc71b4514df1c31a73e120793611695db55d438ccd3
-
Filesize
6KB
MD50e1060153932ca0db485f1db7f8c5a75
SHA1bf0bc4d20059826a3cf2bd070526a830049d67ab
SHA25641eff9c5e1c581a524d50fa0ba34e81d1cd2001a9aa418938d8c39b8d2bd452e
SHA5128365209bf8a971f3e29fac8ece099f46c2c4c60f01f1bc77e341a82fd60ded1768ca77f71d13bde0a0a5da616962cf29ca7db81d75f0bda31611c00dd7606427
-
Filesize
6KB
MD5765088edb9b273753de2b05046f33605
SHA126766a42ee3848d9527b94905a1b050d4d24cc8c
SHA2568ece968705d9312b8705c25fcc4a4c8026010c606be9dfc622184c6626ae742e
SHA5129dd43c3c9eb066c52d1ede5a801d67957a29d98ba2aae5701364f46c674203fd6e3320c0e25b6f2986f0f209714751a3362a4276f669de0f076b565b81249e85
-
Filesize
136KB
MD50365430a13e07a6b10a7a12c693bf3a2
SHA11947623024df81e51bb39389bd236b2289769170
SHA2563193b03d6c2d654f04d5738cbf01f09a19880116bd6cf5715779a5ba8751d882
SHA512fd43a406db2b5469b1758837d1558de7e0bbfada8211cc1a77bd9c5853113a70378a791830babb689e8c08071d5fbf8867d63da26d4c44d3cfd38bd41c5529d5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
39.5MB
MD59ce4ca83ce2f400f0ed801ddc5ebfd26
SHA19471e4dba63b402721bb01571aab10e334200d72
SHA2566aafde56f8c5874be6667421a975da6e5f22458589246671fbc9e745235509da
SHA5120773d5fcac335e73424d617cb7b9e0d0b1c531c54b200e729aa7ed1dbbd375dc06238e4f8fbec3701aa554ad471922ee02ca09692926c111ebf73160045fdb85