Analysis
-
max time kernel
35s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2023 02:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://app.adjust.com/izw3imq?redirect=https%3A%2F%2F2k2asarltg.com%2Fwp-includes%2F%2F%2Fjeff%2Fauth%2F%2Fbkbbba%2F%2F%[email protected]
Resource
win10v2004-20230220-en
General
-
Target
http://app.adjust.com/izw3imq?redirect=https%3A%2F%2F2k2asarltg.com%2Fwp-includes%2F%2F%2Fjeff%2Fauth%2F%2Fbkbbba%2F%2F%[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133239293919379495" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2632 chrome.exe 2632 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exepid process 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe Token: SeShutdownPrivilege 2632 chrome.exe Token: SeCreatePagefilePrivilege 2632 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe 2632 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2632 wrote to memory of 1384 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1384 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 1776 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 3996 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 3996 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe PID 2632 wrote to memory of 2060 2632 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://app.adjust.com/izw3imq?redirect=https%3A%2F%2F2k2asarltg.com%2Fwp-includes%2F%2F%2Fjeff%2Fauth%2F%2Fbkbbba%2F%2F%[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1d779758,0x7ffd1d779768,0x7ffd1d7797782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1852,i,7376372595441431500,16252408229948119288,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1852,i,7376372595441431500,16252408229948119288,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1852,i,7376372595441431500,16252408229948119288,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1852,i,7376372595441431500,16252408229948119288,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1852,i,7376372595441431500,16252408229948119288,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4740 --field-trial-handle=1852,i,7376372595441431500,16252408229948119288,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4548 --field-trial-handle=1852,i,7376372595441431500,16252408229948119288,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3500 --field-trial-handle=1852,i,7376372595441431500,16252408229948119288,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1852,i,7376372595441431500,16252408229948119288,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5072 --field-trial-handle=1852,i,7376372595441431500,16252408229948119288,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5148 --field-trial-handle=1852,i,7376372595441431500,16252408229948119288,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4556 --field-trial-handle=1852,i,7376372595441431500,16252408229948119288,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1852,i,7376372595441431500,16252408229948119288,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
72B
MD5b30653f894997c6bf53549b17d749f3f
SHA142028cd4f60daab3dacee012ccf889d0c68478c5
SHA25649350c6b25451b684acd76ed908b8022aa064cff9095475eb60ef2cf1d4c8c8c
SHA512570e7ced46cd8cf7be975fff2bec993151deff5afc6483526d42dd8097145be841e3c1e1975696635486875f47b63ca50caebf01ae57aa0629b0157278dfba4a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
706B
MD586c351389ad372d3bc00c40e8efe9787
SHA163318b8eb8d032145afd4e47fbb40b6b6dbca6fb
SHA2563350bf28753dc52fa1a24145a8777e50b359ab185464c8f14c7a29d726129648
SHA5124411a11b9ee97f9080aeaebf2db93ac40fe9f89db6f0268a1ae662f4e98e703b2d935a2a5387ef20177bf3448468bc4ee766563cc15ced9e1628f8e9a98a870b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5d2a8556672fdb1518cd25d36ca05f0a7
SHA19a549b8080c443c4786c06b740fbcdc72afc2b50
SHA256e2506f3ce008d268d14a236ab97b82c5a55f329971b1b768f1f71320df887937
SHA512b316d465886d1d1293d00eb582dbb6886333906752bd5a59c7ef99c7255b53d90ecd5043ad3985d19be33165ba446d8a76e9df4537b060682f27a946dd5707f7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD54edb7f1a286980e6b3b6f7f62c62035d
SHA11d3148040c0e3b2ddcaa477a2e77754d6db4d981
SHA25612a61cca9eef2398ab39c8f6df18a21e109e15e3a062cb051d9ada516628b161
SHA512ee2b705a1fa18d79f447e6fbdc9a61aa0107fcb97eb0c3e1276d7be57b375c633f684b1e2254ca07bc4e566767747dcddbb63a09f9928849847e8daae6ef0c4b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD59c38acd4c15e9b9a53fd73f2fb46d05a
SHA1bb51c5aa5e750a67a5df91f393e95f979d2ec9b8
SHA2567246f6e70bb5b75b8329803ec74c6d28ddc018af3c6029917c3f6fb4b12b882e
SHA512e496c4b57f325ca6a37f3df702cf6a54cf96bfe654bd094c9edebda27acdadccbe6e8a636044752ffffb878f7e864b30c006566d06c19d630e23673846bfb138
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_2632_PRNIVXPUADUPZSSRMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e