Analysis
-
max time kernel
65s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 14:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.dropbox.com/l/scl/AACLxyO1iIVu0qB7Rx1RAlZLDtAO5PksYFM
Resource
win10v2004-20240426-en
General
-
Target
https://www.dropbox.com/l/scl/AACLxyO1iIVu0qB7Rx1RAlZLDtAO5PksYFM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133589604120041891" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-711569230-3659488422-571408806-1000\{8EF1F91B-D42A-404F-9AF4-1A792A38CE6A} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe Token: SeShutdownPrivilege 1392 chrome.exe Token: SeCreatePagefilePrivilege 1392 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe 1392 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1192 1392 chrome.exe 82 PID 1392 wrote to memory of 1192 1392 chrome.exe 82 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 212 1392 chrome.exe 84 PID 1392 wrote to memory of 4164 1392 chrome.exe 85 PID 1392 wrote to memory of 4164 1392 chrome.exe 85 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86 PID 1392 wrote to memory of 4684 1392 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.dropbox.com/l/scl/AACLxyO1iIVu0qB7Rx1RAlZLDtAO5PksYFM1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7e66ab58,0x7ffd7e66ab68,0x7ffd7e66ab782⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1880,i,7863280673120674512,16616080386114551188,131072 /prefetch:22⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1880,i,7863280673120674512,16616080386114551188,131072 /prefetch:82⤵PID:4164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1880,i,7863280673120674512,16616080386114551188,131072 /prefetch:82⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1880,i,7863280673120674512,16616080386114551188,131072 /prefetch:12⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1880,i,7863280673120674512,16616080386114551188,131072 /prefetch:12⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2940 --field-trial-handle=1880,i,7863280673120674512,16616080386114551188,131072 /prefetch:12⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4436 --field-trial-handle=1880,i,7863280673120674512,16616080386114551188,131072 /prefetch:82⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4448 --field-trial-handle=1880,i,7863280673120674512,16616080386114551188,131072 /prefetch:82⤵
- Modifies registry class
PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4812 --field-trial-handle=1880,i,7863280673120674512,16616080386114551188,131072 /prefetch:12⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 --field-trial-handle=1880,i,7863280673120674512,16616080386114551188,131072 /prefetch:82⤵PID:3272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 --field-trial-handle=1880,i,7863280673120674512,16616080386114551188,131072 /prefetch:82⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5448 --field-trial-handle=1880,i,7863280673120674512,16616080386114551188,131072 /prefetch:12⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5854d827d1b654f6dbf535518e4c0fdb7
SHA131f6d304c6305eae3b4b95dd208984d3fa3ea233
SHA256047f3f08dbc5d58eaa3270c97cf46ace913f959e992211aa62af761637d83279
SHA5122ae205a985af875fc7f402bbd865321a35799d55647b86e2fe5e789cd5c9fac7c11bddb257ed8ed3f1308ce1c6a5a0eecdf7848bccceacf5dd309ee6333d46d9
-
Filesize
1KB
MD5751844549a4131e263085c7c9e69ad69
SHA1c4863c042b2da384d782af7b7fcc759ef6291b00
SHA25694b990b97e92619d14cd40da4df9f1e77d4d34dfe75cb22c07d4c5ac93893896
SHA512c6f6a5bf205bcbca57bb40095ace0eda1fd6517d85618565f7389d16f0f039561e29ebf362b299b7a33168d5399f6e39b375d30ce4ce6d844e804ed63b281c2f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
689B
MD5223ec2052476558b81c8550dc6bf4e98
SHA164b04ce73b68379de8c5f1508982b25db5ae90c4
SHA25642c732b6e9f701bd237b76f1e2017c1da89729ab6f66b6e3cd1ea548c0c3854a
SHA512a91e3aec6281950922c56ead9f456a782fe21b522fced0d383f45ca56a57a101d2b6e6de5b0d5eb45998d57b98349e9ed06bf0e943c9b70914977e517e2122b7
-
Filesize
1023B
MD53f09b1370c58c28951dceba0380192e8
SHA13a940986a8b99f94b5970f64dfce97084fa91a1d
SHA256f31c15b8e059eb99d49cb0df8333fd2771be7932c74d0782200fb19aa4785d50
SHA512d43bab66fb9d82dd2842082f03ae3f64957ac8852e1b42439f344d14d0e214d28a200b715d02754a3337f90a5b72f8439a711ba27db9ae3ae6ccbf9389ec1564
-
Filesize
1023B
MD55321870772e6b431325db9db591a6335
SHA1791aca179edeb5f443edcf4157488305d826ce28
SHA256f9c080ee3ccdbc8c6db65c1d7a470f8a21425b483523d78641db2172da671d91
SHA512cc1059a74ee164e425bb6db6715078034dcb5cddfc67d4cde7d5681570dc55cbc13f1b905f33fda9fca7746ef6d60f27b8f7021580ba27436b34a99c1158e67d
-
Filesize
1023B
MD50736f5c02d3163f46a6e214c8f6bab17
SHA12fc16de6b57fe5880321d4e2d6c7c776f15b40eb
SHA2567e1d53704747e02726c13871f8abe02b526a6016eff29477075193d89e9dcb71
SHA512c4a5b4a4613bb4034e3daa4fd4d3ffda22709d8dbd44c9295b64c06a209476cea701b301aa8c058d7f485da192f685596a1d6d62bf6c4d05f2aa8ffcc4c3b8b5
-
Filesize
7KB
MD59f0234122ee707fa384d7715167c9717
SHA13b8842b0cea93439b8325c63b7e3ae8ad3be2719
SHA2565062c633205d1ce621b8552df511c646bf1c7d036dfcbcbcf81c62530efbec7f
SHA512331a83edb462981aa72d6c04ac64e8adce01812533a7c1834104041ea3efe55cd784de10df9268686552ab29673000f3b4129a78c91405db7ac9588105952603
-
Filesize
7KB
MD5e01bf242a59ef663a8caa9ba6dda2553
SHA1d735b7a4497235debf804ce8fdf94e95b717368b
SHA2563a688991531ed905c739fe0933e3b7eac61c076ab139b78a979a7941d9d8c174
SHA51241feb2e05e7df370dc3bf306bfa9d49286cdf861eb7bc351fddefff275ff0c283fd8d91690f1258c7b6883e12edf74efee044624b4c64f38590787ea05555e42
-
Filesize
130KB
MD5eee073ec866bf0d5d95622f35a82dce1
SHA184f9f37145daa10dec2a4f7edfb500c287f7ebd8
SHA256c9955f618a38a9da3bb9d15a72e959ee80007433fed9f077d35acba3fb6b89fd
SHA512e09b2cca7845f35555446654df036e56610a72734888b5e9ea6d96da5ff389f47ca3731da1bec48cee791504a173b0401e05b624382019c31817c12bec056fb7