Analysis
-
max time kernel
166s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 10:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://docs.google.com/presentation/d/e/2PACX-1vTikKHOuCMRAQnyuWl6bkSnoWXxMBgQaYb36E7fDJr4AK0ZL-qckfBYFvBPAnCFm1lkRHLFNf4FyxqO/pub
Resource
win10v2004-20230915-en
General
-
Target
https://docs.google.com/presentation/d/e/2PACX-1vTikKHOuCMRAQnyuWl6bkSnoWXxMBgQaYb36E7fDJr4AK0ZL-qckfBYFvBPAnCFm1lkRHLFNf4FyxqO/pub
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133415815911680572" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1344 chrome.exe 1344 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe Token: SeShutdownPrivilege 1344 chrome.exe Token: SeCreatePagefilePrivilege 1344 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe 1344 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1940 1344 chrome.exe 89 PID 1344 wrote to memory of 1940 1344 chrome.exe 89 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 3480 1344 chrome.exe 92 PID 1344 wrote to memory of 1572 1344 chrome.exe 91 PID 1344 wrote to memory of 1572 1344 chrome.exe 91 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93 PID 1344 wrote to memory of 4432 1344 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://docs.google.com/presentation/d/e/2PACX-1vTikKHOuCMRAQnyuWl6bkSnoWXxMBgQaYb36E7fDJr4AK0ZL-qckfBYFvBPAnCFm1lkRHLFNf4FyxqO/pub1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc56989758,0x7ffc56989768,0x7ffc569897782⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1884,i,3204020542035831730,6111758322518030314,131072 /prefetch:82⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1884,i,3204020542035831730,6111758322518030314,131072 /prefetch:22⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1884,i,3204020542035831730,6111758322518030314,131072 /prefetch:82⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1884,i,3204020542035831730,6111758322518030314,131072 /prefetch:12⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1884,i,3204020542035831730,6111758322518030314,131072 /prefetch:12⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3768 --field-trial-handle=1884,i,3204020542035831730,6111758322518030314,131072 /prefetch:12⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5100 --field-trial-handle=1884,i,3204020542035831730,6111758322518030314,131072 /prefetch:12⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5092 --field-trial-handle=1884,i,3204020542035831730,6111758322518030314,131072 /prefetch:82⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5376 --field-trial-handle=1884,i,3204020542035831730,6111758322518030314,131072 /prefetch:82⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 --field-trial-handle=1884,i,3204020542035831730,6111758322518030314,131072 /prefetch:82⤵PID:428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 --field-trial-handle=1884,i,3204020542035831730,6111758322518030314,131072 /prefetch:82⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2108
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc56989758,0x7ffc56989768,0x7ffc569897781⤵PID:4984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD506fce067ea854890c3cf40a66af2eeba
SHA18a4ad63877c81fee435869b51ba76983421b6cea
SHA2569afe1386a17f80a26e7ea2e26c3f41ab0f608cc916af5f18be56bd52b08691b8
SHA512182c38253a5ab2696968a0ef110fe8773c76d22378a3c8850c6e6c4919ca1e5d9a1d29c4e4bbfbd99c43b1f6415e29e5dfb41abbdaef0b8fae77e94a961aa4f2
-
Filesize
2KB
MD55ed189d09202817e85c9c67dfdb1a47f
SHA1c60bf97ba134fa5a5b5413a68e9251486e1a32e4
SHA256b1a3c073077e94c62a4bd9073519f668b531e1d714d544a7fcfd7e6ad06c951e
SHA51223f3fde5c99d8c3986abd641d53de3330654cb0905d319ff8eeb48dd2c6806a13fe7e21917ce86e55bcb675b46757c02387507bfc32c86638377b7c6b7d5ac8c
-
Filesize
1KB
MD5ac92f6dcfa5baaf7e0aeab2cda3a3762
SHA1f3989248fcd0521cd0e205fbca61cefa4c0febcd
SHA25656b09343331bf6f40458787eb995565ca0eed029db61b1cad7a131dea3029c81
SHA5124e1703e176f144d94ae55da681c26c0c4e688d280890bb0ff68ff32bd8d6fbc4269bb54a1490be49bb707ca281baef198425d4a0cc51c9c1f42dcf60a0619c14
-
Filesize
706B
MD5bdd179fe2b934a24385c0664abd45666
SHA1c59bfa61f041cfdfd697595ba19e7c520e7a97ec
SHA25669ce69a65e569fdc57634d0ca0bd9c86b365df408c0c1959d6667a4c3a1ef0be
SHA51265a8e65e67e5ffb890c86080b077e4dc1132fe194ca713cbecfd74ad957733145fc42116bddd468d71eb6e75749a56fc074e1f2cf96419d53b18984c2ce68c1f
-
Filesize
6KB
MD5165b03e9dea45f23f76206ffd90371a1
SHA1dd5e33b0b93533f137b882a68dea1989ea46cefc
SHA2563baf4e418a38908a89c0f0054190bbeb77c33d255c4149d77fd1b137c22262b5
SHA5126ea2c04dd5dc6857c3d545bebb65d240d710b4b08beaed45ed64a6c129c7bef12d957cd6bfd1a0e14e4f982345eff16850721488b0641017a375e8be056efe55
-
Filesize
101KB
MD5de65793d452b95de31e8d26bc67e3897
SHA1a003324442237c7fb23a6043273a8f06a152afd8
SHA2566f5dc55cfc7e39b839975296e67c5df43cdc06afc83f1992ddc4ef464fd918fb
SHA512bfb1c3bf74c2ce4f7d4100f2e4f119e909c91bfa6962879245170e9e5a21386b05951503a93d76ffbc8921c5750722f379ec925d53b68de22a905820746dd098
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd