Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 13:38
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133236203648277140" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3992 chrome.exe 3992 chrome.exe 3728 chrome.exe 3728 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3992 wrote to memory of 2832 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 2832 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 3132 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1568 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1568 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe PID 3992 wrote to memory of 1812 3992 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://hitachienergy.compliancedesktop.com/GTET.V.3.0/declaration/view/Vm0weE1GVXhSWGhXV0doV1ltdHdUMVl3Vm5kVU1WcHlWbFJHVm1KR2NIbFdWM1JMVlVaV1ZVMUVhejA98/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffe06c99758,0x7ffe06c99768,0x7ffe06c997782⤵PID:2832
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1832,i,16555953407830047542,1089575107557973609,131072 /prefetch:22⤵PID:3132
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1832,i,16555953407830047542,1089575107557973609,131072 /prefetch:82⤵PID:1568
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2164 --field-trial-handle=1832,i,16555953407830047542,1089575107557973609,131072 /prefetch:82⤵PID:1812
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3216 --field-trial-handle=1832,i,16555953407830047542,1089575107557973609,131072 /prefetch:12⤵PID:5076
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1832,i,16555953407830047542,1089575107557973609,131072 /prefetch:12⤵PID:1612
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4840 --field-trial-handle=1832,i,16555953407830047542,1089575107557973609,131072 /prefetch:12⤵PID:3984
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 --field-trial-handle=1832,i,16555953407830047542,1089575107557973609,131072 /prefetch:82⤵PID:4780
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 --field-trial-handle=1832,i,16555953407830047542,1089575107557973609,131072 /prefetch:82⤵PID:4348
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4692 --field-trial-handle=1832,i,16555953407830047542,1089575107557973609,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\4d1209dc-b305-435f-a9f1-ff6a727e3d3c.tmp
Filesize5KB
MD525ce928d5a1948fcf4333c89680e600c
SHA160b2a1c3c40b46a02c92b3d6c1f45f3957bdb4df
SHA2560e4340468c3b3fe2ac4581c0431729aac6452da18be0fd79d5a107f618b5c649
SHA512267aa8c35a4e683a55b316624ffeae28bbf380251d04ad0537f17b0b550b334612d69dad2077ee8070b7271f36d9587f1cc625add02da3b6a3885752ffd0757f
-
Filesize
168B
MD5816dc3bdb8dddae1379903da493fe803
SHA1bfad8e78122d2c898ed32e83031eceda06b15073
SHA2562739ba4bd4c4a9109d4fa30d9483f2b71df761f189637461e053f1f0d461b821
SHA512ab6446f3d72c635305c551b91aa7aa86a494b8511b2e4358e61b3f68871c264f71f29c5b48864dc56fb61a3f5d8d671405c5a66453ba3031eba68fbf919a50ea
-
Filesize
1KB
MD54b81a4879fcc6eb019dd9cba87759e31
SHA16a8a8c80418826b8bdaebfa841c484138209be7e
SHA256791cc8b6563b87c48e2da3cf1a06f305d2cdfb147aed42a5e4fec6db3f8d81dc
SHA512ac1cd48f7de2dabac5c60f0b7d75289bad77bb87e715ceb00a202eb0155dd287f8442cb7064b24e70bb10b5c7cbca49109230680189cb940f6e8f906e772dfa6
-
Filesize
1KB
MD5301e5792dc2f6a1a223b76f36c6f3a70
SHA1f68844769a6b38239199a723cbe57cec7d0fbb0c
SHA25677a17f46931c4a20d9ff8ee59ab779066682c970c427c00ec4234cba0e23c302
SHA5129af8abc3a38cb363464f16eb57371025892568047a48f12096bcd19a60c0433f6adac1e27e518958420028986bec79850481780edc5602a4cc623ebd38ddcadf
-
Filesize
1KB
MD553cba78aa5c2fa82cc791d1b1c08586f
SHA14bf5dd7c29dd724509ee47c10c1042873bdfce45
SHA256a7c5e58e80542bb4d881a960db09add062b4cf05a41a96ab90cff7c26ce860da
SHA5128363e3366a37bdd933b4d83b53253438ca1d6e3c7868364c789a907cf7dffba38a935bb5b8973d672058cfb15f4b2b3c5494cd573eafff7d475c9fa4f791a2ee
-
Filesize
1KB
MD507dfe3ac25afba9af846e67c148755fd
SHA15998d76b1881179486a39a9e5510ceca885c886a
SHA2561c127eb0de93d95715f7bcf28c2ced92f5c270e1dea70c38bd92f224c3c7a8f0
SHA512d4ac1fbe7fd9beab5ca0256170f757de43d324c401df0cbff1354f35eb7a069b859cde3e3e36c736fe82639a6feee9ea593eabbc4cce9a70b46f8bc760b26cc9
-
Filesize
5KB
MD578572c793abaa55a73601a7fb95e9317
SHA138af4a4bed1ca62868fd4e9b35b66ecf6678c55b
SHA2564bb89b80e189410a0df5955284ece20e07a83ee37e1c8d53bb050f563e8d2308
SHA512540d320708ebf1fc6d95f7207400a3df7e47385c35dd1e6ab276ed9fdd136b3ef9326133c6b1666668d151e8cca4d26c8d42968ebc495684264e167184b4664e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ac29f5c7-3337-4624-bc9a-37b418f10252.tmp
Filesize5KB
MD56898c7b81879d7757fb9c855fc7076a5
SHA1f58bc5e6491cc27837ff8723bbd932ee5014b018
SHA2566efa108fdc0486cc2a7bd8a2a90ab6f8eb448e1f6813c4d19fb653891b4d7d8f
SHA5129b28484899e8036f0af651963173579a0fd5268716e7a71ef83c0c9f651517afb552f11e15fc19b9d79f265d124140e020efa9f436c143c4f809491f00833294
-
Filesize
143KB
MD56958c13073f7ae1956991826f439162e
SHA1ef11dd8098e8b2b5dede9db9328616f75aa14b99
SHA256d5864dd422e2ae8e1ba368624094e4ca6e55241538b81dc57d9cc3a8f246e93b
SHA512e332eaa90555cc0c3c1c6407fe5747fe26ad5efa28ca3a65f77d736dc19936a3a21fd2e7f02055550bba516a10ac8459707209ca8ac675a2dbca5f61b0aa9df3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e