Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2023 04:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://casa.tiscali.it/promo/?u=https://daniellara.art/neww/auth/zegynu%2F%2F%2Fhey@example.com.com
Resource
win10v2004-20230220-en
General
-
Target
https://casa.tiscali.it/promo/?u=https://daniellara.art/neww/auth/zegynu%2F%2F%2Fhey@example.com.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133241958891544348" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1920 chrome.exe 1920 chrome.exe 4216 chrome.exe 4216 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe Token: SeShutdownPrivilege 1920 chrome.exe Token: SeCreatePagefilePrivilege 1920 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe 1920 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1920 wrote to memory of 5060 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 5060 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4896 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 1232 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 1232 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe PID 1920 wrote to memory of 4328 1920 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://casa.tiscali.it/promo/?u=https://daniellara.art/neww/auth/zegynu%2F%2F%2Fhey@example.com.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b6039758,0x7ff9b6039768,0x7ff9b60397782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1828,i,18298142597695338453,3738681210664193994,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1828,i,18298142597695338453,3738681210664193994,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1828,i,18298142597695338453,3738681210664193994,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3208 --field-trial-handle=1828,i,18298142597695338453,3738681210664193994,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3228 --field-trial-handle=1828,i,18298142597695338453,3738681210664193994,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4560 --field-trial-handle=1828,i,18298142597695338453,3738681210664193994,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4896 --field-trial-handle=1828,i,18298142597695338453,3738681210664193994,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3200 --field-trial-handle=1828,i,18298142597695338453,3738681210664193994,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5220 --field-trial-handle=1828,i,18298142597695338453,3738681210664193994,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3616 --field-trial-handle=1828,i,18298142597695338453,3738681210664193994,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4524 --field-trial-handle=1828,i,18298142597695338453,3738681210664193994,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
216B
MD522418b01f49e23d23a0551f5ddd13a86
SHA1dedb89d2f03b80e0a0635eac3a707c5763a56049
SHA2564d669ef850a507bb9c6867bbc3f1feb2b6c2a382994118c128c9a4ba6101fdb1
SHA512ce76c3ee546e7546812d103f398838f0986b4a783206791bd4782a377eab5960dadc1ddc91124c824697bf27d56706b99aa6aef37da3429893377055318d4190
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD5f63a1ad0b00bc680ee12facc9b96bc6a
SHA1d3729c4fef4e8499de83e8f7b861f359871f848e
SHA2562160acefc369c115e562013c373532108ac666d8d4b842190029a25f00ed4b94
SHA512d26fab64fcc9fcbc3b2ab542f11f339f838a3273ecac949e44f5a4ba0d340dbe7ad327eed3da41ec70402f3cc565f730b88ff8c79dfd694c94afdb43a7803550
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
874B
MD5a8082219c257bfc1a9cbd370d3ad3396
SHA14ce56648b43891b6c4b9395e628a6d008daac291
SHA2562b85bd07a5c10f7796eb6090921bd21bf6e311e8cf9e17d4b2c3eeac66d04f72
SHA5121759169d675a7d1f8a5a12b34779123f779d8fe7ae504d0b74b00e995e6c3f797d491004f95431c0b4624ffd1356248f88c11797ccbb65372f2655186a16b5ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5e071c5f6a1cb8fc00c6a0f909c89ec27
SHA116bd67b0e879a3cf49801666ebf9f7df93bcdbed
SHA25690d315248774dae5f847ea6e1ef3f1beb8aa101c7fa4213ae024535dde484f60
SHA5120941c4cf5cb448375075e92f733ee1d6bed9a59f61863dbf1848dbd74120928edccea96d651fd7880793d893fc38376d64ec90ab2c8c98f46a3215ca9fc66f1d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5af5e1365177dc0c2cb3c3dc9dc07bb07
SHA17714f1b5d49bafca4d20e923858a3809981d3245
SHA256705ce5c19bd4b8a8cb16a8485ded05cb4b06cff04406ae35b406d11f97e1d7d7
SHA5120256b334524dacb72eec876535ae8e153b5c44c6b8c35057f4292f1909d021dee63c9c2446bf09a990b61b852ac9708314c2ebd5f83aa8c7e595af205770a9de
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD557e674871c6d9d98f01632d1e0b10717
SHA1dd0b1ee3475e4729b8fffe60dfca9ee2fd7263e7
SHA256ddb9778c0e1d93285fe195c37ce9e8c6cb031be04f479fcf50cd469528c6902f
SHA51249b709031c10aef799e7216a787b5dd9f9655ba08d326070f000d64a42e36198d2d1973cd0bc7d996afa6cfbe7edcba349af6ad1f82805a95abc79e6dc6a61e9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_1920_XUISEWVFWONRRRCVMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e