Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2023 10:19
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133242131891227298" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1964 chrome.exe 1964 chrome.exe 3864 chrome.exe 3864 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe Token: SeShutdownPrivilege 1964 chrome.exe Token: SeCreatePagefilePrivilege 1964 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1964 wrote to memory of 2360 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 2360 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 428 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3568 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3568 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe PID 1964 wrote to memory of 3224 1964 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://outlook.office.com/mdv?redir=http://j6gn.42.poia.com/vk8frsaz%20#tj_base64_encode%20aHR0cDovL29xa3l0ZHplLmh5dW5kYWllYXN0ZXJuLmNvbS8=?em=roger.luo@abb.com%221⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2e629758,0x7ffc2e629768,0x7ffc2e6297782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,15206669865806416660,3182240606156440098,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1812,i,15206669865806416660,3182240606156440098,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1812,i,15206669865806416660,3182240606156440098,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3188 --field-trial-handle=1812,i,15206669865806416660,3182240606156440098,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=1812,i,15206669865806416660,3182240606156440098,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3844 --field-trial-handle=1812,i,15206669865806416660,3182240606156440098,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3376 --field-trial-handle=1812,i,15206669865806416660,3182240606156440098,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 --field-trial-handle=1812,i,15206669865806416660,3182240606156440098,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 --field-trial-handle=1812,i,15206669865806416660,3182240606156440098,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5256 --field-trial-handle=1812,i,15206669865806416660,3182240606156440098,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
120B
MD5967c7d4f653be58474e9ef732eac2260
SHA10e67866ee7c72cbcc0f7cea8af983d105f5f0d01
SHA2560ed2f41ae45e174b8cb02e542306aee6ee610329c8e8e32833f35cf56359f335
SHA51237cd3cdf952f58cb86a208da474e8e1bd6e9e83ed005e3edfc0ad7b77c146ad41a15e24fe3fb3627b811dcd3d2c8fd9f37ac8ad8525ba1986e8c1c1ba2d09ff8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD557e2c97e3d2d8066e5ac1c9f7f2e8b9d
SHA14d137d7d95dee172b96d59bcc90a2cd441daf4e0
SHA256fd67ada7ecb639d4af5298fb9b603680d89eebb5bdff8ba5d2b6728acc624209
SHA512f42d5e54cd9a39ecdc20db8514bdc27616cafbb93474dc27e80e6f3ed1b72134b260e4deebf99de12cee195a489c5ea0f953c06743cb7dd6e30dcd82ffd5f135
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD51510c888bc37edbf814d560dba063313
SHA1d82e14a7e3fa20e3df4621bdd55b3fa30309625c
SHA256f0d96136fc57283336e7e6bb7274682d78034bc314e2b12b85cfb7399636c39a
SHA51265efe39d1b7f71ebb399b5efcfcd8705cef4de183df79dfaf25da015646a60b63a8c2a4401c6cfadd73345b2d7aa65b6a69f494d02898f46df7292584e4146c7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD501e86f7b86834ab3b4bf32b19167f048
SHA1deaa2ac3a2f587291d6df9b96f99d86c871b118c
SHA256c224a0db26123177a4b796d894f4379cff3ea88065623f4a044acb5a49509a6d
SHA5127650bcd4a886c80156acbed5bd29f3fefeadee2dd0bf13b77d34e5145101f159aa36a7af762e1d612151e46c141f037a9ba708821dce30da9f8e2e93cf36c186
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD52ecb803379180bc4b246985085e1ee15
SHA131f65b90ef722a5eff7600e50eba0815f30dd0b6
SHA25607f36ca8e2bd4eb456e3c84a768c5fb563bbb88bca5161bed2948b5e5c033ea3
SHA512ba7fdeda90759cda53146b111e196b1db28ab690b37f9dc666af6d096018592754d66bd7a9cc713cefcd02b207974c0ccfafba5e8aef9e8e9a8ef582f73bb6c3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5c7b9999ee7e39fdebd4b771787197eb2
SHA111db2972d681d810d4921b44968cce5fa5cb0546
SHA256f2570b98a70b82cf9ab46a65927dc10dda71f43703d37b9b25b3148987eedd8f
SHA512686383975298a6187f9df3dc22f797d43a96ad49a14b5c719067c1eb19cb3cf6ef9c857673d5f5daa6781d1f1eddfca683e97c7c05482e26b4141129eefc08e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD5b08b124cf1ebf00810d925dfa0003cf7
SHA1baa00de6c052b4009d05aa854dfc368eebb10fa5
SHA2565b1066dfa2da8a26c99117651d6b8bb978d6ca834972341a540011927443fca1
SHA512d3a0563c8e55af272935de88de2e495765120d136d2a6605fcd18cc0452fbd4e70262b4ccf9d2a433ab3c884c46b9defbc6f7b2fe1aebeb586ae7d96bfb07d0a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_1964_SQMJVCCZRSSEMVMLMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e