Resubmissions
21-02-2024 11:30
240221-nl61aafa53 1021-02-2024 11:27
240221-nkhlased7v 1021-02-2024 11:22
240221-ngvrfsed4x 10Analysis
-
max time kernel
426s -
max time network
435s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2024 11:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go-link.ru/P4YKx
Resource
win10v2004-20240221-en
General
-
Target
https://go-link.ru/P4YKx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 1972 msedge.exe 1972 msedge.exe 2288 msedge.exe 2288 msedge.exe 2640 identity_helper.exe 2640 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
msedge.exepid process 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2288 wrote to memory of 5036 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 5036 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 2732 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 1972 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 1972 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe PID 2288 wrote to memory of 4568 2288 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://go-link.ru/P4YKx1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffacabe46f8,0x7ffacabe4708,0x7ffacabe47182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,2012570774594287011,15352399667500618802,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,2012570774594287011,15352399667500618802,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,2012570774594287011,15352399667500618802,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2012570774594287011,15352399667500618802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2012570774594287011,15352399667500618802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2012570774594287011,15352399667500618802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,2012570774594287011,15352399667500618802,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,2012570774594287011,15352399667500618802,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2012570774594287011,15352399667500618802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2252 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2012570774594287011,15352399667500618802,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2036 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2012570774594287011,15352399667500618802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1844 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2012570774594287011,15352399667500618802,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5360dd5debf8bf7b89c4d88d29e38446c
SHA165afff8c78aeb12c577a523cb77cd58d401b0f82
SHA2563d9debe659077c04b288107244a22f1b315bcf7495bee75151a9077e71b41eef
SHA5120ee5b81f0acc82befa24a4438f2ca417ae6fac43fa8c7f264b83b4c792b1bb8d4cecb94c6cbd6facc120dc10d7e4d67e014cdb6b4db83b1a1b60144bb78f7542
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD56fbbaffc5a50295d007ab405b0885ab5
SHA1518e87df81db1dded184c3e4e3f129cca15baba1
SHA256b9cde79357b550b171f70630fa94754ca2dcd6228b94f311aefe2a7f1ccfc7b6
SHA512011c69bf56eb40e7ac5d201c1a0542878d9b32495e94d28c2f3b480772aa541bfd492a9959957d71e66f27b3e8b1a3c13b91f4a21756a9b8263281fd509c007b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
648B
MD55c066642ff082ff15c00675bf7332a99
SHA134468647bd2f481f5113fe717d51f70a33a1e18f
SHA256724bd5b477e41739007f53519beb92e2aed6e38b87857647fb3fa2426805ebf8
SHA512b35d9abc42575eba949884792fc1c569c6cc44b6190dfe779b25359302cd89caadbe752c36487f3cfaef49ffcf85efe286751f6eb6c257a594bf6c145bbe8a7a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD53ba34e216275cd404852da47760632c4
SHA11f19d33cbd8c4fb829286c5eaf6cf09ad6b62ed0
SHA25600f6f2ead2453fac0d36b2138f34315f0c232ac5c6a928d5b4d979a42a2747b2
SHA5120da4124608cd5301a9e1ab6715fbe2456ea41e519bc5a9619700d8141e8e097a4101b04050278e3bd4d28b3241eece23184171722dcdbd35f110aed6343508ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5c329bf52c1e9c8fa5d744ba9819c67ea
SHA1694119efdd70eaac4f82dc8cf80d65e7716e5664
SHA256c41b575d0d9d258cb9e361f191f11f911a93980c5ded702455b88a408140a483
SHA51240abd29c8877ee881c4ad2096272a99958260c5f8fcf7370a4a256dcd583b07502089bdd55cec2f0078f355c5b44aa625e68c9d21fc37ebbd1602a6c7185a528
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD561c6ec83a5b66a54f1d44015edd3bdb4
SHA178a5d59be7ed24c5b985eb45da0970faad0adfd8
SHA25636df58c66f03b440761287fc0954763e5b299b6b7a09a99d84879922a86f94f6
SHA512e68848510dd6c60c361e807c0053fbbac59d992281c24b8d79a89d2839954b2154466670efd5e47761a72d9e6946e204a258000389bd6253b00ac4cc945b0feb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD588974734bab044e4483ae9c4e770c693
SHA124c4f4fff3b4fc043ede6e1f87fe8ecbcce74c0f
SHA25613c7752a6272345ae800a79268b50256134effee9a4ee01196b4d2f8e0239966
SHA51258deae2e6d3644b903321f3810474435247a9c29036896e0073c40d710ed700f13170f8544896b2a0716352cadc2e607d7a78947a2197f7d081695f92eb01b71
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bab71aad-7c84-4207-afc7-fcc955c7279e.tmpFilesize
6KB
MD52d4c8d82b2c3741d70c7a62105dbc28f
SHA1718d0fdeba4fe175bcd23415e654f31d92346b4f
SHA256fb81d5a67b82a8c4644a3d5cccb0a956eb32a529b7a8fa15d5d9086febd1e1a9
SHA512a90522f418b1e11306c8d813efb25e5e11993113303f8236292473a05e79deeaec88a2ac2ea86359757dfc200e1e3267677d57e15f0dca7e59a9b63269ce9883
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5a4e83f2b855abcde01a665451136c38f
SHA169888e05b32ea322837957a7172f48a42c33a29f
SHA2565af1cc7d87d52fe9fff5df9cc345b2fb360fb9076c6269f4cb7dc54bed26cf67
SHA512563eb1de60bdd7348cdbf68477ceaa2d1e97e631efa3f5aba3313ca733bb828492ed65ded4f79d13da1aa970b404df4fe2e26364be80023df80983d6ba9f8bf8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD56377119e62a52d9c457382dd9c413496
SHA18400583bcea1537ff8c64036237cd2c506b2d2d0
SHA256bbb093468a6bde687315aee06821224f0d22d642a9543948f7e36bd4ac9562bf
SHA512e88807547dabe21c2196941b8ab4e9a34ebc7c70674945d48ef910a41a7b2c18840de5207118f83306029c07f146acf3a09c0c4b616e2c1d15d705a9d93277f1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dicFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
\??\pipe\LOCAL\crashpad_2288_IVQZLWUFCZENVJXEMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e