Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 16:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://forms.gle/2BBTKUCiukVLzzMN7
Resource
win7-20231215-en
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133506723875243780" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2044 chrome.exe 2044 chrome.exe 4008 chrome.exe 4008 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe Token: SeShutdownPrivilege 2044 chrome.exe Token: SeCreatePagefilePrivilege 2044 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe 2044 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2044 wrote to memory of 884 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 884 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 3104 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 2436 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 2436 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe PID 2044 wrote to memory of 4952 2044 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://forms.gle/2BBTKUCiukVLzzMN71⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c6ae9758,0x7ff9c6ae9768,0x7ff9c6ae97782⤵PID:884
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1964,i,2263527231289014897,17877727643508939770,131072 /prefetch:22⤵PID:3104
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1964,i,2263527231289014897,17877727643508939770,131072 /prefetch:82⤵PID:4952
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1964,i,2263527231289014897,17877727643508939770,131072 /prefetch:82⤵PID:2436
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1964,i,2263527231289014897,17877727643508939770,131072 /prefetch:12⤵PID:3960
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2584 --field-trial-handle=1964,i,2263527231289014897,17877727643508939770,131072 /prefetch:12⤵PID:3540
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4604 --field-trial-handle=1964,i,2263527231289014897,17877727643508939770,131072 /prefetch:12⤵PID:3356
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 --field-trial-handle=1964,i,2263527231289014897,17877727643508939770,131072 /prefetch:82⤵PID:636
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1964,i,2263527231289014897,17877727643508939770,131072 /prefetch:82⤵PID:1052
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3776 --field-trial-handle=1964,i,2263527231289014897,17877727643508939770,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
96B
MD5da6858c367ee49d8daf6f31b550d1754
SHA14f3370c9fb7a6f173d6ee80258ab563882e6fd1b
SHA2567d9c064c40fa8997a0b083c428fa124e8314b7ff392010e92a80c39b5f59ecc4
SHA5120b647f460bd22093ae81f45e263d338c8b68956a7c99fefbf2ac1db8c15b89a7200f7e94af4a6e8e8e17d211685d5638ce95507b8fa40dc1669a62a86518309b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD5240a1290dca9f28da38b757a386031a6
SHA13214650dc98d0fa0ffe2d18d52cc8b3d52b965d3
SHA25660390ea879587f94939a7c61200ff7b80c19d129c85097d7db8901efd0cd63d2
SHA512a0100b3f62943509980ef4f129e6917b82df13fca6727c81d0e0552233a2416cdea9b0b9830fb41b4645f0aa4d8447fbc27de86baeb9bf47fbf4fa3c38b94505
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
537B
MD5c2ac7aaf73aef0fd53f8e1891aa8146d
SHA10744adc3c423e11d2e3709beb83cc81ae616378e
SHA256885fa43a2b70253b9e60d81592efa093a8d63fcca9ef252c6a9cb95050f99dea
SHA51279e41f7ba869a1a96e5fe195328e16c23bfe3e21c81e92ee411b47a9607b2055dde30de225c73f2ab42426c7fa69780979d0f800a86a02b6185d8e352f94de4a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5d3ff8ece625b6d6dbe2a54c53582ff46
SHA18869491b020befd54ed15c59bae3beec912ba686
SHA25680477e4ffbd04a60bda9f96409cefb0cefa283cfaefb224c05f6579c83ee53eb
SHA51240c47eafb2153a235460bd07a44adc42467423227668f1a61c015acd679ca43a909dc1f376d9176b9d142ddd8074151e834b920aa58261f030f75e898ba5809b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5db4f213823d859a40cb2e65d595832f9
SHA1688d91779b649a8027c091425d0850b56404a6a2
SHA25642a467ce2977e16d51a7fa4f1063418594b956fbb7aeb17318779361f2aa199d
SHA5122bb48c5efe6dbc9727529bfa3ea94f4ac382b173dba5f96161296ff42c418439bf14eef5b9450d971e9567915c372cfeb1771f68ef85391d0a771c886496df45
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5e561d7a481a00515ec923ea41d1c744f
SHA1a4719c872f676a1e9b086a4a8e6ec9f9525399a0
SHA25666bea54d1997f62cdf5b05cb019123de6b0e48d34c29a9642df1315804cce025
SHA51259aaeed06f564e8ed42e6799332e5d7198342ca1ab3a80c42c92af2e57f68d10251328e2aa6ce4268d08b89cf9a2d48da181214d50072165510f4ed7d0beaa4b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD57c0582696d1ac0e05241434c48ad504b
SHA1b5c5ea745302b6cef36c3756be79a9b659851f53
SHA256bfc4084e60219bebdc5a21895fca3f5edaae7531ceada25be2bab3c508222faa
SHA512009ea2f52382d3c644f2d87c88674bea8642990c43a9c2bd698de7ef846dc1483ec67f5c8933b42ee5503d89109974b4b806c1944e3a7e17be3f255b34d4a7cc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
114KB
MD5409b0827a6f33a5dd60c85a2d839bb29
SHA19f45c44a5385e3c8b5d85c73552b1ef0d406a2a3
SHA256bf270f158b7064e4cca50c3051a0c2f41364ca6b4abcc18c4d6f88711b442854
SHA5120ad66cc1a6747b6e23f99fa5e17e94245bd83156ccd3d907284bcf1e9787c84e9132bd7fb609ad699a886cd554ff6c66749d5fc2e25d878061e40c576d033ae0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_2044_SEVMWYUAFIQMXKXQMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e