Analysis
-
max time kernel
80s -
max time network
68s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-03-2024 07:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://qptr.ru/aYEx
Resource
win11-20240221-en
General
-
Target
https://qptr.ru/aYEx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133561710051517194" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3516 chrome.exe 3516 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3516 wrote to memory of 2428 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 2428 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4344 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 396 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 396 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4544 3516 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://qptr.ru/aYEx1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffaf0509758,0x7ffaf0509768,0x7ffaf05097782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1800,i,16398253290076320346,11920791038258762085,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1800,i,16398253290076320346,11920791038258762085,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2152 --field-trial-handle=1800,i,16398253290076320346,11920791038258762085,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1800,i,16398253290076320346,11920791038258762085,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3156 --field-trial-handle=1800,i,16398253290076320346,11920791038258762085,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4816 --field-trial-handle=1800,i,16398253290076320346,11920791038258762085,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 --field-trial-handle=1800,i,16398253290076320346,11920791038258762085,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 --field-trial-handle=1800,i,16398253290076320346,11920791038258762085,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 --field-trial-handle=1800,i,16398253290076320346,11920791038258762085,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
480B
MD5072feb27f7688006db9f9b13f3b80580
SHA1cc1125728696172e236092364d1f2b1847098c3c
SHA25621b4eef9b9034e6de20f3249aec3ef1abd6bfb0a5772f892ebd79b082768e1fd
SHA512ea3c2fbb38d94ec82c7f3096e76c962ddda95e13c09572be86c2dc2659fc226e84a59d76838180487f9231c4b5c410c8248d45e6191f2a8e1fadb42c89fc9ed1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5db19a13052befde3aa651d0f0ce1db25
SHA14d1305db7efffea7b91ea48292324e9f8c2d296b
SHA256aa1434aaa5f06643d6bd71b1823a54c14cb7497c1ee7842c125f09e50714c53f
SHA51278bf7a8d3eb7780acbdb3e1ce70698538bfdca2627d0c6f6bb38cf434206162577fbc803d554cae529a078116bfc9918bdcf4ea4436385cd9b0bdb86ea6c63a3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5c56d14376ee5e0bc6e9d96d94171b3c0
SHA1ae5aab12c4210a1757ac9d134a8f965c32f07859
SHA2560684d54075738fbb8a06a3fe2622dd30caaa6580c4dd39149793286a6697bb3f
SHA5124d65c3645382169c27d72f5fc1f4ed9b16a9d39369a323c53f649fec054494dc0ec501fd1f28153dabfc51c2449b9a94a3d697f68875472a7d4cdfc4e6f76183
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5989016dd6a481fb504a6157cece79b4d
SHA10108ca81543979f460b294ea830e510e4eed9ece
SHA25676ae06b6297a0d5ea924e000b5aeb9097633d7abffecea5358955e5f801dcdd5
SHA51261742ccaa6262aacb80c8f941a5401073500606cbb2a1e69fec8dcb951ef599fe5a5bcc26414e3e3239f1b6903900f4b02f5137aafa3adbdb37b56a01a3a3a42
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5ba6702d63c7762476c372336763518c2
SHA1e162b7201ffd4365675f159cb813f3557ca4583f
SHA25662b49e40787db05e2306795705e949ef6b0f8273e9c1a152104db39f826c11f8
SHA5124e4cda3524c47bd0b0f045565ef798b85413e6146d7178adc5075e876548a225a31f759035e4f85098cb8110b1825b552f11990baeac715e24540fa4fe462bba
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5132c325813fdecc22f045c009e279479
SHA15888c607f79f0bd63008707429160ffe5cd8890e
SHA25685aecac7793d0a4f835a939d3b5bba6a7fbe932f8630534d995af137e3cad7be
SHA5120e4c3505c35dc9536c35f7bec7330c1e535e650af13eb61c9fce28960d9babc5c030d3052890125796ca02e6de8f76f617cbe732004ba81aae3f83d1de7dee89
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
130KB
MD550892aa07dc8bad68663411c0420afff
SHA1effae15a10cd276cf8db0f56fa07406dcfa1a658
SHA25684c0a2c5cd24d083b345c07710b212bcb729c764670026f45e44f9ca8e0f1053
SHA512e1e5271fe2aaf4012989d96f24a0996dccc0b1bb96164f58ab3de37fb579c77520c3e04b67a9928160a977aab1769d41dff07db871a0dc5af5be9a1e74bc2f9a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
94KB
MD509b05edc94b79e7c9e97b0de9c9bab6f
SHA17ac9829bc73585cacd4b0a384e14c7a6de1a9da6
SHA256287d33dd31a77ebdc6606b6579d6db701184b2f9656a346d9226cf13d4c5de11
SHA512c318eabb413ff75cb086c13a015a2000a2a0f6df17a99ef3dc424ab497859281aea1cb125d0fcc06816bb51b56b8af1435f1c7e8ea61fae066855ad0fb7308d0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57eec5.TMPFilesize
93KB
MD578f6987f0e9a9c554653a47e1fb31f2a
SHA19517b495e5c6bc0f44440f041a0f57772a5c4031
SHA2562a922c4db0cd466c141a97d14f0e9084f87ba7b0040e4b7052abac1e953147ca
SHA512a632fa292be8f1b2e651aa7f4df401936778e4b7d2588bf47d343485e75dfd9df44db7b0c3ad822b3bad86b61b5e372afa214825698bb1c47061bacefbacc940
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dicFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
\??\pipe\crashpad_3516_XTSEYNRRIOWYZFEQMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e