Analysis
-
max time kernel
42s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 03:46
Behavioral task
behavioral1
Sample
8xyz8/Defender_Settings.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8xyz8/Defender_Settings.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
8xyz8/dControl.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
8xyz8/dControl.exe
Resource
win10v2004-20240226-en
General
-
Target
8xyz8/Defender_Settings.vbs
-
Size
313B
-
MD5
b0bf0a477bcca312021177572311e666
-
SHA1
ea77332d7779938ae8e92ad35d6dea4f4be37a92
-
SHA256
af42a17d428c8e9d6f4a6d3393ec268f4d12bbfd01a897d87275482a45c847e9
-
SHA512
09366608f2670d2eb0e8ddcacd081a7b2d7b680c4cdd02494d08821dbdf17595b30e88f6ce0888591592e7caa422414a895846a268fd63e8243074972c9f52d8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2508 chrome.exe 2508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe Token: SeShutdownPrivilege 2508 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe 2508 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2132 wrote to memory of 1416 2132 WScript.exe 28 PID 2132 wrote to memory of 1416 2132 WScript.exe 28 PID 2132 wrote to memory of 1416 2132 WScript.exe 28 PID 2508 wrote to memory of 2580 2508 chrome.exe 30 PID 2508 wrote to memory of 2580 2508 chrome.exe 30 PID 2508 wrote to memory of 2580 2508 chrome.exe 30 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2596 2508 chrome.exe 32 PID 2508 wrote to memory of 2412 2508 chrome.exe 33 PID 2508 wrote to memory of 2412 2508 chrome.exe 33 PID 2508 wrote to memory of 2412 2508 chrome.exe 33 PID 2508 wrote to memory of 2436 2508 chrome.exe 34 PID 2508 wrote to memory of 2436 2508 chrome.exe 34 PID 2508 wrote to memory of 2436 2508 chrome.exe 34 PID 2508 wrote to memory of 2436 2508 chrome.exe 34 PID 2508 wrote to memory of 2436 2508 chrome.exe 34 PID 2508 wrote to memory of 2436 2508 chrome.exe 34 PID 2508 wrote to memory of 2436 2508 chrome.exe 34 PID 2508 wrote to memory of 2436 2508 chrome.exe 34 PID 2508 wrote to memory of 2436 2508 chrome.exe 34 PID 2508 wrote to memory of 2436 2508 chrome.exe 34 PID 2508 wrote to memory of 2436 2508 chrome.exe 34 PID 2508 wrote to memory of 2436 2508 chrome.exe 34 PID 2508 wrote to memory of 2436 2508 chrome.exe 34 PID 2508 wrote to memory of 2436 2508 chrome.exe 34 PID 2508 wrote to memory of 2436 2508 chrome.exe 34 PID 2508 wrote to memory of 2436 2508 chrome.exe 34
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\8xyz8\Defender_Settings.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files\Windows Defender\MSASCui.exe"C:\Program Files\Windows Defender\MSASCui.exe"2⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6c19758,0x7fef6c19768,0x7fef6c197782⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1332,i,957221490608961624,14775594241817848858,131072 /prefetch:22⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1044 --field-trial-handle=1332,i,957221490608961624,14775594241817848858,131072 /prefetch:82⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1332,i,957221490608961624,14775594241817848858,131072 /prefetch:82⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2208 --field-trial-handle=1332,i,957221490608961624,14775594241817848858,131072 /prefetch:12⤵PID:268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2224 --field-trial-handle=1332,i,957221490608961624,14775594241817848858,131072 /prefetch:12⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1412 --field-trial-handle=1332,i,957221490608961624,14775594241817848858,131072 /prefetch:22⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1480 --field-trial-handle=1332,i,957221490608961624,14775594241817848858,131072 /prefetch:12⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4088 --field-trial-handle=1332,i,957221490608961624,14775594241817848858,131072 /prefetch:82⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4100 --field-trial-handle=1332,i,957221490608961624,14775594241817848858,131072 /prefetch:12⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4044 --field-trial-handle=1332,i,957221490608961624,14775594241817848858,131072 /prefetch:82⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4040 --field-trial-handle=1332,i,957221490608961624,14775594241817848858,131072 /prefetch:82⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
322KB
MD5372f65739b0f709ebc3beb0fe1376c25
SHA1ddd25ffafd436199660c44247faaac0abf70803a
SHA256ced5eece1f5243e13c7d9923c0029c8ca501658357fcc18c4f1dfd8b12dba91c
SHA5125248b89c83cce889947249b28e656d7f6c93ef4dbc70c33b55ae424108428d2039244e865c580468f573665a4feebd767fdc242043a2f100583429009006c72a
-
Filesize
194KB
MD5f5b4137b040ec6bd884feee514f7c176
SHA17897677377a9ced759be35a66fdee34b391ab0ff
SHA256845aa24ba38524f33f097b0d9bae7d9112b01fa35c443be5ec1f7b0da23513e6
SHA512813b764a5650e4e3d1574172dd5d6a26f72c0ba5c8af7b0d676c62bc1b245e4563952bf33663bffc02089127b76a67f9977b0a8f18eaef22d9b4aa3abaaa7c40
-
Filesize
168B
MD515cfd4edd6857346a5ed9c5c879bef3e
SHA1db67e7b5b3b1b05bfc6b83678abe28b0df98eaa9
SHA25611c787954aac8c200d417151c457928b0fa636a3d4e1e4be36cab0e8aa97c1a6
SHA51214149d17cf9ebbfce0a3ff6f803b0520549e64d19f737785a398e9016813f635a8f16d325f6eff0e4a974e1cd540262063cb3b4f3fdb20cdb28550b03ce0d7cf
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD5e27cbc5e318d3ee87c4e8e6b4657f57d
SHA10c39e0148fb76698dba673764430e1c62103cbd4
SHA256157b8755224256bfc7fdce4050253a5691e65e67a8e3f1f82aa3f80890c1dc83
SHA512da0450265917feb31e87fe49cfce04baf59d3c00ba47e9022cdcfdd7da6d4236a80d8bc0100628f94b87def481d9aa80b49b363d91d7f7e2edd458fb086b90d1
-
Filesize
4KB
MD535d67043e4d04ab85e51e7503a472838
SHA1f5b7918c3efa9425daea2fec57686853c83aa3d4
SHA2561eb8000c0f7928daaec09052871bece834eea9ae79f4af78ac9ce89c3fe1ba41
SHA5125ec4816f61400fd6c6ab81bbc72d62207718d972102b36f8a74e3306cbd244362c7d1511e23d56847926d5ba0d7fcc1cca490b9a395e6a05be22e06bbb4f831a
-
Filesize
4KB
MD58389d0c8aa75e3c8d11e77c6aff45a69
SHA15e6b5309ee2b25325caefc2149e5ed56b01fab4c
SHA256f06347beaaf4dcc444c8581adfc761ffc8bd58ce01c8accb2b890c092dab9a30
SHA512e68839cbe6ff5cce2faa52ab0955e7235d3af1f06ca205522705f4363cf2dc4a21723c58fde636f13e64e191aedf13649a25d071dd68112f4a1c0c6bcf08c821
-
Filesize
4KB
MD5c7d9a78bb27580a9da021d5d78dc83b8
SHA1e1d66ec200e5bfdbd2f927d60c81acafc093f81d
SHA256973d7374288553d615e5d6164916ce39178f3eabe3ff96a2a86af21c9f213c86
SHA512aa7f9ee326755137bfa3e300386b554b6699f107d85c9e48e59ef7656815abaa7547b588826d2fc99f6e1b2bae8815a1b64c6d45b848dfd940b178cb6998a3a6
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
318KB
MD5581c7e23c3f44faed2d722d15362818d
SHA1b2cb263644dc2d66484e9ab30c0f3a5f2a671068
SHA256a6a9879eeebb6e00b31422908b887eef76a32885ecd4b088e6008f379c0d8cea
SHA51244397b9a69349f9ec64fc1c7c82c1d7ad25fb2c64e789b46fed9a19f565ce56a339f0e3b09cf873b0ca5989424c3921f2984620b16bf905da44804de567cbcef
-
Filesize
131KB
MD5b965baac37d82ffa86ab139ebe17f84e
SHA1124acda2d46e023d5612682ff4b32d8737f2fbb8
SHA256ac500fc509896c5a80532739dd4005c5660a03b88f7528baf9cd82286b536f60
SHA512607d20badfec7f0b10700c55414ac44fa7e7538b8f96fdb3c7ac248d3ffc6e31f921760b8d194ac8a9a348619b380800e2d2551e7b83feb3940e65448af0160e
-
Filesize
262KB
MD550faa030fa773179b77895b25eb9491e
SHA1a34fcc183d99978474f8ca4a081e251eae17a423
SHA256bfeac3bf4c519ea51775d605be198d5047e27bfe14d04a9383c043d5e509b26f
SHA512ba96a28fda6fca0d8c46cfc8f8ab05583c0d76526cc5920d6d6786e0b621632d0d806a58962a2d41a561e2c3d3bac2e12b65231dd57f86b38e68d4db6843561e