Resubmissions
16/05/2024, 18:43
240516-xcwydsaf2z 616/05/2024, 18:06
240516-wpt4wsha2t 1016/05/2024, 17:08
240516-vnjfbsfa37 1016/05/2024, 15:39
240516-s3meesbd9s 614/05/2024, 20:41
240514-zgd99aga49 614/05/2024, 15:07
240514-shlx6aca2s 814/05/2024, 14:22
240514-rplqasah63 6Analysis
-
max time kernel
1799s -
max time network
1728s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 14:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://bit.ly/triageshare2024
Resource
win10v2004-20240508-en
General
-
Target
http://bit.ly/triageshare2024
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 8 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133601708161958940" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4364 chrome.exe 4364 chrome.exe 2892 chrome.exe 2892 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe Token: SeShutdownPrivilege 4364 chrome.exe Token: SeCreatePagefilePrivilege 4364 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe 4364 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 3040 4364 chrome.exe 82 PID 4364 wrote to memory of 3040 4364 chrome.exe 82 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 3208 4364 chrome.exe 83 PID 4364 wrote to memory of 4588 4364 chrome.exe 84 PID 4364 wrote to memory of 4588 4364 chrome.exe 84 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85 PID 4364 wrote to memory of 1512 4364 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://bit.ly/triageshare20241⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6da7ab58,0x7ffa6da7ab68,0x7ffa6da7ab782⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1660 --field-trial-handle=1896,i,12019898121207424348,16746481237522954867,131072 /prefetch:22⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1896,i,12019898121207424348,16746481237522954867,131072 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2168 --field-trial-handle=1896,i,12019898121207424348,16746481237522954867,131072 /prefetch:82⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1896,i,12019898121207424348,16746481237522954867,131072 /prefetch:12⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2920 --field-trial-handle=1896,i,12019898121207424348,16746481237522954867,131072 /prefetch:12⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3848 --field-trial-handle=1896,i,12019898121207424348,16746481237522954867,131072 /prefetch:12⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4208 --field-trial-handle=1896,i,12019898121207424348,16746481237522954867,131072 /prefetch:82⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4516 --field-trial-handle=1896,i,12019898121207424348,16746481237522954867,131072 /prefetch:82⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1872 --field-trial-handle=1896,i,12019898121207424348,16746481237522954867,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD54b419751b95602190e663dcfb4397186
SHA1584625bb902af71e0d551a72995cce18736bf738
SHA256566e5021669d6f9d13f9af0fc133ffdb0d2f7b5ad5698aecbbfe1de1c9751ba2
SHA51260d3976779651bf7652fe6e5e9bf2ed251439ee04a891d3dd5112cac2b7ae6b70cd7cc7a49cf2b71931a3308ebdf945a5254d60a6789ebbbcc749ea2742d0eeb
-
Filesize
888B
MD521d1c8f6bc03be7900f4a3f589633acd
SHA11b5fa02f1a84d92e328fec04de42076a1216bcdd
SHA256c7ae6b0d8a8fa80d8dc4ed00e623ea14d4549719076bb5843db5d12768335321
SHA512e6e45d93ff475eee303ca6e4fa9bdefe14776e6db79f42e018b9394f30d92573fcfabee38a1eaf931468d854e10b7e73ea355f764580fe2d73cb1485cf054218
-
Filesize
840B
MD595eb29031df21b8fd977897a90cfda1d
SHA1c614c2f3abdb4336bad7b16a5df932abaffecb45
SHA256016e03dcbc58fd1e7c4494d70c3e85e3ea79a218720f3264001f071dd58093cc
SHA512417f0f63d5712397c311a8667e9dd9c8a95cb3850904b790c965bb39a4d9f0cdb31190d198201a7169a895224bcf70635c386925bd3313e61936c73a2abe826c
-
Filesize
912B
MD5c69303b0b6f5621867efa288abe86711
SHA1d50cc2d2510c8907920844e384555a2c83694540
SHA256a9a0da0bfb546ab468bfab1993375b6b43e91d2b0a472bc2a77b3e1a4e013d99
SHA512bf3b9fd5e224f5fec78c0294dc530087c8eeda1987b65e3aaf837fe9c5211556ed0d89ed6beebbb6d24e89a9c1a727a665029489bf9cf0bc1a791a659bedd818
-
Filesize
4KB
MD5f47f4ed597172537e70afdad4ccd783d
SHA16d153edd0c7cd0e28091c3aaaa690ffe749865c7
SHA2560dfb0a79e40ad3ca54de806a8882c7b76e63bb44a1ed530d112f2ee30035dd65
SHA51245fae1a424dc4d5d428e0aee0902c238a650aff03ed1a3c9414ec495a2505afda168830f2fa705229da4daa692b5aa675022379ae436f6ac335f8f83a2310b5f
-
Filesize
4KB
MD5113b050b40d6db16e18af4d3af8fd9f0
SHA117a9726efbeeb3cd3628ce6f4a0c9f97c4169536
SHA256f08461c43dd481aed67755b64cb7974aefdcafcfdabcf4d8b974c0c04532a0b6
SHA5120c83f3692e0eca66fcc6095f729472bcb7faaea70cc23bfc4d1918f39f7df4a6eb3032399e93a0f1e57c847fb932efcc781eedbd1dbbcd80df4442e00b93cc85
-
Filesize
5KB
MD5716cbc03e533c4aabdfc42522b7b81b3
SHA191a19ba98fd026c92b7b10bf7fc85aa13acad0c5
SHA25683ce7e3d0efb1e2e9cc676455701d5fa5fad99d84e4acbcdf11f6b862de79290
SHA512aaee12cf2655c5e3aac962960f47555c9f70a480c84b6a1e96811449072a9fffd0413cd8c24e49a5875a4f728570a582808411b916ccb1000a8b9cc15f2a0485
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD505e1628508a9c8027929f32588b06221
SHA1c5a8cab22facece8ef29421446e024ac4f434f0b
SHA2568a6f4a00c812e551300aed03ce4e00ff6910dc84d8155a2a76cdd48e69d8159a
SHA51200a3eda2531fa1000c5bf8821ca63171300ff63709eb28218eef23efbb8a9d3e3696471b6ce8ef3c4ddefffe81297d0e3a0e577e089ed3dc40454e1ca56a2cfd
-
Filesize
1KB
MD5fc51b4e2ffc085d0c1c45cc9d56b212b
SHA17df79d2f6461a901f788231cfc3848dcf932f76f
SHA2569aaa8d9e705ac49291d155f1ed50538b8f31710aa7a3382f0666962c1104eadd
SHA5128e0e9f4da0ae935d2d528bba4c29fb196ed60fd9d29f484c3c84792d890fe8ee5cf64e0cf92ec3391c8b30bcb3466361c0f42de6696e035be7924bf387c84445
-
Filesize
7KB
MD557c52270fb6d17136d49bdd4da62178f
SHA136fc540f583525fb257c4dae9af114e063a04257
SHA2567368d5665d53c40f301b247c89530043a05e48c78c7767b126ab74b5aa657bb3
SHA512bac5d2c731b4a826abd7c6c3dc542e008cecae65ce55aad59fd3af14ef5e1bb4e1e59ef2b95830840693bf95412da60653f171efb912e2c99ad815f0b30ff744
-
Filesize
129KB
MD5ded5a66e62c8c63af60db0cda1bb9ef9
SHA101433535ecb7a1a51cae6f4a37aa1193f210750a
SHA256eef9691414c640d30c052e0b870ac0aeb087ca971afc4fc50e06c8df1b29528a
SHA512fe0fe754754137afae39b14562dac22d9709f877bfe124c43aa2c2e08b1cc40552f4b2a2d59203ce07a8e363cd1970afa3de0a57141096b0ceb5c18d6f8f17d9