Analysis
-
max time kernel
264s -
max time network
506s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 20:12
Static task
static1
Behavioral task
behavioral1
Sample
7z2201-x64.exe
Resource
win7-20231215-en
General
-
Target
7z2201-x64.exe
-
Size
1.5MB
-
MD5
a6a0f7c173094f8dafef996157751ecf
-
SHA1
c0dcae7c4c80be25661d22400466b4ea074fc580
-
SHA256
b055fee85472921575071464a97a79540e489c1c3a14b9bdfbdbab60e17f36e4
-
SHA512
965d43f06d104bf6707513c459f18aaf8b049f4a043643d720b184ed9f1bb6c929309c51c3991d5aaff7b9d87031a7248ee3274896521abe955d0e49f901ac94
-
SSDEEP
24576:mGIyixBMj+/A2d+UKnvT+LwZWj7iDDVVYrz0rbzGTw3DoA/sk6smE:mGbj+/BpKnvyIxVV/XDoAfmE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2928 chrome.exe 2928 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe Token: SeShutdownPrivilege 2928 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe 2928 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2928 wrote to memory of 2672 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2672 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2672 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 852 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2592 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2592 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2592 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe PID 2928 wrote to memory of 2000 2928 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7z2201-x64.exe"C:\Users\Admin\AppData\Local\Temp\7z2201-x64.exe"1⤵PID:608
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6159758,0x7fef6159768,0x7fef61597782⤵PID:2672
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1320,i,14261120675148465222,6381596489593917999,131072 /prefetch:22⤵PID:852
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1560 --field-trial-handle=1320,i,14261120675148465222,6381596489593917999,131072 /prefetch:82⤵PID:2592
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1432 --field-trial-handle=1320,i,14261120675148465222,6381596489593917999,131072 /prefetch:82⤵PID:2000
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2172 --field-trial-handle=1320,i,14261120675148465222,6381596489593917999,131072 /prefetch:12⤵PID:2376
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2180 --field-trial-handle=1320,i,14261120675148465222,6381596489593917999,131072 /prefetch:12⤵PID:1252
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2396 --field-trial-handle=1320,i,14261120675148465222,6381596489593917999,131072 /prefetch:22⤵PID:840
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2436 --field-trial-handle=1320,i,14261120675148465222,6381596489593917999,131072 /prefetch:22⤵PID:1512
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3180 --field-trial-handle=1320,i,14261120675148465222,6381596489593917999,131072 /prefetch:12⤵PID:2336
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3392 --field-trial-handle=1320,i,14261120675148465222,6381596489593917999,131072 /prefetch:82⤵PID:2684
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3420 --field-trial-handle=1320,i,14261120675148465222,6381596489593917999,131072 /prefetch:82⤵PID:1912
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3400 --field-trial-handle=1320,i,14261120675148465222,6381596489593917999,131072 /prefetch:82⤵PID:2168
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3500 --field-trial-handle=1320,i,14261120675148465222,6381596489593917999,131072 /prefetch:82⤵PID:3084
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4180 --field-trial-handle=1320,i,14261120675148465222,6381596489593917999,131072 /prefetch:12⤵PID:3252
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3260 --field-trial-handle=1320,i,14261120675148465222,6381596489593917999,131072 /prefetch:12⤵PID:3700
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 --field-trial-handle=1320,i,14261120675148465222,6381596489593917999,131072 /prefetch:82⤵PID:2836
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d172483c6e41ab5f4a31e4f5daae2ee
SHA19e215fe05b9a440d41c94fb0375b72875353b788
SHA25678924fd0bd1de0332a802c7cdd320d886572ec8ea8a826ca00634186d39cc1b2
SHA5120c8d8f94b88bba837cf5b99e368dc8f37801340c81b84291fcb00c6e2044f39a5d611f147dcadda4022401e13b0ecf202a85235c293f4b390536480030fe6719
-
Filesize
264KB
MD5159ced6e41942e97a2df3ae2197eb551
SHA127bf65f6465ce2d22a357d2ee7f4fbc069d4215f
SHA2560aec03523948288b0013d413ee585181655b3f118e2d385df3e6d9738ee765d6
SHA5123413ede7e5ca430b7c78769d609dac2e46f0df6dc7aa00bf6c776af6a7ab04b5241368a6b0dae35992f7c2c08f891c1adaa7e76929683111d1bb51daf647a548
-
Filesize
16B
MD5979c29c2917bed63ccf520ece1d18cda
SHA165cd81cdce0be04c74222b54d0881d3fdfe4736c
SHA256b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53
SHA512e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a
-
Filesize
1KB
MD501aee1825f0d88c3dca7ef28ec5863a1
SHA1adb0a553bd829904af736043aff8b67b47560d3d
SHA256ce136672e0dfa90ce1f22ca3f633d9762bf3f3fa7df3bf08e98556c246e953ea
SHA5125413a0bbff437eb3b41e4945f3dc0069decb4e45df83a153c911a42a0a5db2ec3c8339abc0d860a0f6855ec60e6537996afe04a7d9b43c8d8b0610be3fadaf24
-
Filesize
363B
MD5f153830ba60773a7cbe4a4586766a8af
SHA101543860be76a3fa31a355ed4c9159de42fee08e
SHA256c51f00b3748b1f5c7f488dccf5f129e5131158ad02d3ad274a41686846a0a64b
SHA512f445238db352070fa98e4021b4db5c7c8f8544b2c579d33e72cea995a60481c4bf1a953d319164c1b2a52d72b7a2c15b9ce1fe939f036b7494dbbd4528be16aa
-
Filesize
5KB
MD5bd31e622d649a315c318398612eb58bb
SHA16f1b0f186e0ea34d1f17bca680179c83d40a476a
SHA2567dc0bcc8175c15fe80d89576431ece1c947ff540be2230b9420f341213adc1ef
SHA512a19909e5398262976b146ccf03ca3ccc5b94d595bd40be363822fced18468babbb3234c0026e461d163e97ddb736df22db1a99cabe1be55ebe761655e5a45487
-
Filesize
5KB
MD5444366cf558c35de5e67c4185bb1a0cb
SHA1f560ad07db2265275fab9b045eec745f9301a94c
SHA256ee147bb139c675c5402793dca42cdfaeeade4d8466ae89b76322cfda3bc5c370
SHA51270decacde02ecfa2f396ec428c338601fc1d761eeaccae904b5e85b39f1bfce4cf4b71d65170ed5afbd41d70d626b8aa0ed9527dfabd02ccd7da777eb3eda2dd
-
Filesize
16B
MD560e3f691077715586b918375dd23c6b0
SHA1476d3eab15649c40c6aebfb6ac2366db50283d1b
SHA256e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee
SHA512d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e