Analysis
-
max time kernel
1801s -
max time network
1692s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-es -
resource tags
arch:x64arch:x86image:win10v2004-20231023-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
05/11/2023, 17:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.blackmagicdesign.com/products/davinciresolve
Resource
win10v2004-20231023-es
General
-
Target
https://www.blackmagicdesign.com/products/davinciresolve
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133436803815692272" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 1136 chrome.exe 1136 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe Token: SeShutdownPrivilege 4764 chrome.exe Token: SeCreatePagefilePrivilege 4764 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe 4764 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 680 4764 chrome.exe 84 PID 4764 wrote to memory of 680 4764 chrome.exe 84 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 4708 4764 chrome.exe 87 PID 4764 wrote to memory of 3980 4764 chrome.exe 88 PID 4764 wrote to memory of 3980 4764 chrome.exe 88 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89 PID 4764 wrote to memory of 4720 4764 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.blackmagicdesign.com/products/davinciresolve1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa0c69758,0x7ffaa0c69768,0x7ffaa0c697782⤵PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1884,i,3948557620350755814,11223924096791954990,131072 /prefetch:22⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 --field-trial-handle=1884,i,3948557620350755814,11223924096791954990,131072 /prefetch:82⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1884,i,3948557620350755814,11223924096791954990,131072 /prefetch:82⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1884,i,3948557620350755814,11223924096791954990,131072 /prefetch:12⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1884,i,3948557620350755814,11223924096791954990,131072 /prefetch:12⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4564 --field-trial-handle=1884,i,3948557620350755814,11223924096791954990,131072 /prefetch:82⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 --field-trial-handle=1884,i,3948557620350755814,11223924096791954990,131072 /prefetch:82⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1884,i,3948557620350755814,11223924096791954990,131072 /prefetch:82⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=748 --field-trial-handle=1884,i,3948557620350755814,11223924096791954990,131072 /prefetch:82⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5080 --field-trial-handle=1884,i,3948557620350755814,11223924096791954990,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1136
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2236
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x410 0x2ec1⤵PID:1460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576B
MD5fe8380af2cfbebfdfd2d9018841dddfb
SHA1f269d395e0c577791eb370aae10edcb0b042217c
SHA256012d795773ace18e52a5036110ffaace949692a3f2128c856c7f9a1213904774
SHA512db1445e9d8b4ed5bc9ee506c4d135518b647cafff7a6f3061bc4f786748f3640e485248cf58ff34870ba8e4e5add83a6a5468ba8aa584861a627a65930efa038
-
Filesize
2KB
MD5ed64d5bfdee6d775325760b84bcc45c6
SHA134d38bc638fc8049159c1fec956ed6227207679d
SHA2565b30ba1e709ba6516e25a480d6e3b650d2186100705698a6e1d68ccee600ce4b
SHA5121ffb0f38beb8c5175ceb2348fa830aaa71ef7a17a7980d61836c038beb44101d58f947991c02d0e06d5dac582b93f723c90b1199b6b8333ee224673d6025afbb
-
Filesize
2KB
MD5476c01a500ecf34a746d5f3b58564d2f
SHA1d7962b85eb4465596b716cae58e6b3c6737abf3b
SHA2562c2350130f07cc0163a3a2ccb842acc095c3f782c12c3959b12944de9beac3a1
SHA51281cf8863e939cc3a511a19e630e6600bf8ca9d95d6f4c7fa465bb279621dba7906dc8e027b6e5a735700aef80c552b2ed6348e6ea33039192923831f1a781c4b
-
Filesize
701B
MD5fb64899a479611762f59b7a371399a8c
SHA18bece25e4c74d7da6171027429bb6ae1bf2341d4
SHA25672819cad3548501164766cd900afeb28d496fb3c879a37d0c207c598f6e3a0ed
SHA5123f1ac78f6e56da1fbc25082cdf1459d1ff2473e795e00dca1664386135f0da2fd1488142bc09f8cb695eba37620f8de02c09279e70848739b59a98c677e68264
-
Filesize
5KB
MD5eb870b1aa2a707e813b8b5f7a2f0cdf8
SHA196e25861a8db143fff9cc18e06b148abca65963a
SHA2561cbc8f6dab48ec4a7ec878d5cbd36a06042284cc0a020a047cda29152907916d
SHA5125fa70cd325961603d9e24ce3750bb6acfb1bdcc26e87ebf7fe0ce2bf0f814e731e43b5edd5905f4a2e76845a03be7fbec7fdee86c58cb5ea9be734d0ff4a8a60
-
Filesize
6KB
MD5d3d297f484ed16fd14f410fc02ada1e2
SHA1fcb76e80935be1cdcde7afe749d4842e0ad84400
SHA256faef028db83256b7b44f7290eb080b6afef9a39a547bea9695d931a194b7b8e3
SHA512bd7d2144e52f3e3d07814cbd82a2df684e726d69a9acf4a6e789d0fb92766f429fd427f1ef6f9595b4a537992fa8fd771f07c8f8d8be8523b2cab9248baf26e3
-
Filesize
5KB
MD5c3ba469645713b18427cce0393950124
SHA1a56968f560b50e28ddb0141008258e1b0b3b4d8d
SHA256b7a88445b03d0c0800b2f67cebf364d0d02921c8e540a434f75a357db7d1d6f3
SHA51281244fd79950b4f830decd7fd63800221a8f73dc5c2cde441c4b5b2d824c1baae5e54dd969c39678a5beaff05ca3a567f364e68e92430e3f7a00d250abe9210d
-
Filesize
109KB
MD52c445e1d72b9e9a0a4549b4c5481ad23
SHA184e5a235826115d9e5b7bf5711fe2ac64f6ba7bc
SHA256e6c7f79f9524faa4a10541db2055c8b3115f4f005593130cbd0ce8d921097798
SHA5125b518e3d2fbde5170619a01c210826c27f77b1ab9a37ef3c7179a160e06f29d073d83dc943bf29cde7e0d11c8892b993e1a68e585ee72579473586bf6ebedd01
-
Filesize
104KB
MD5f0c7850b1f82a0f551f657d7b101f717
SHA1d8ba289f285210615ae1ae64e00bbe4e6d319c2f
SHA256534794e1d9483e419124b5978e201394e3de41cd6afd5fb794ba5321ce2afab1
SHA512626f1359f64318ca9c2651fff43052bb403ef1fe51cfdeaae649fb56a3537ba721f6f649a748f65bc0f66ee90f3f24c916ef43a598efe84b1a277c744f394970
-
Filesize
103KB
MD56bb6adbd3569659bc2f3d33d66c63b07
SHA15ffdfca2857163fa0e92d2229734d23bfcb91966
SHA256ab47c3381d7ed7c0429c3c4320c1496023e917dd7f1553a5517b974fb8409a75
SHA512190b475593b7e66a8e8879ae070579a6d6ff075ba5bfdfad7f2528ea18bb53e7624d48b6d2005507e35ba5eb823164695336c23c605cd45b4752fe020a74e1e3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84