Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://url10.mailanyone.net/scanner?m=1s9VN4-000FLz-4R&d=4%7Cmail%2F90%2F1716320400%2F1s9VN4-000FLz-4R%7Cin10b%7C57e1b682%7C12862802%7C10019077%7C664CF90A555EA77825E7A1143BAB48A9&o=%2Fphta%3A%2Fmtsv.ilp17is2h%2F.u5h-hk3lmth.&s=uBimMn9B_z1ukbOGd2Jkej7jSWQ&
Resource
win10v2004-20240426-en
General
-
Target
https://url10.mailanyone.net/scanner?m=1s9VN4-000FLz-4R&d=4%7Cmail%2F90%2F1716320400%2F1s9VN4-000FLz-4R%7Cin10b%7C57e1b682%7C12862802%7C10019077%7C664CF90A555EA77825E7A1143BAB48A9&o=%2Fphta%3A%2Fmtsv.ilp17is2h%2F.u5h-hk3lmth.&s=uBimMn9B_z1ukbOGd2Jkej7jSWQ&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133608851436877456" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2672 chrome.exe 2672 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 2672 chrome.exe 2672 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
Processes:
chrome.exepid process 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe -
Suspicious use of SendNotifyMessage 28 IoCs
Processes:
chrome.exepid process 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2672 wrote to memory of 1704 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1704 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 536 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 5020 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 5020 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe PID 2672 wrote to memory of 1172 2672 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://url10.mailanyone.net/scanner?m=1s9VN4-000FLz-4R&d=4%7Cmail%2F90%2F1716320400%2F1s9VN4-000FLz-4R%7Cin10b%7C57e1b682%7C12862802%7C10019077%7C664CF90A555EA77825E7A1143BAB48A9&o=%2Fphta%3A%2Fmtsv.ilp17is2h%2F.u5h-hk3lmth.&s=uBimMn9B_z1ukbOGd2Jkej7jSWQ&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3441ab58,0x7ffe3441ab68,0x7ffe3441ab782⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1896,i,9197419526419488896,16476160123678990633,131072 /prefetch:22⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1896,i,9197419526419488896,16476160123678990633,131072 /prefetch:82⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1896,i,9197419526419488896,16476160123678990633,131072 /prefetch:82⤵PID:1172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1896,i,9197419526419488896,16476160123678990633,131072 /prefetch:12⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1896,i,9197419526419488896,16476160123678990633,131072 /prefetch:12⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4456 --field-trial-handle=1896,i,9197419526419488896,16476160123678990633,131072 /prefetch:82⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1896,i,9197419526419488896,16476160123678990633,131072 /prefetch:82⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2384 --field-trial-handle=1896,i,9197419526419488896,16476160123678990633,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5bfed560a2daa38f142deee105668e039
SHA1723d434b7f3e6f6b1b68553ca27abf47aa8ecd3f
SHA256f699017999a6951ba02d5780cc5fa6e14aecf95758ef3e7c9f68e9779f65e0fd
SHA5121479cae1f62d2b85686fc77efc22db8019e4fd9c88e95740babeb1444f6f2ffa56210a8346de318e1fb52e2b89135c82807ac850a7846c4ce5234ec9ba227008
-
Filesize
1KB
MD54d032a955de1b56b37c25cd77f92e0ab
SHA12514d73fcbe753d0358185f095745cd9497ec0a6
SHA2565e12d4fe5aa805dcb3ae396ea30c573cabe1ada87a4f72e079ea23228ffac601
SHA51227c535c2079b71f4055e6bd19af80905fd72b7917bef822c5334e46052f2a2c2b0c38279b36c49e7e5b064aed261aab68706c7a3036c784e8c5e6192331570e3
-
Filesize
1KB
MD5dd2730d7a13e37cea3e13d7fa9bcc444
SHA17f9641210539812f1a6235e8407c5beeb26a9f34
SHA256b025f9f7ab59e64788e624aafdbf7d46da525b006ff12d890a424b0053057315
SHA51239f183ab7636540f0d15d58c79d2e62bce8fc2b61912f2c53c68d09e86095b006e421bdf3693c66aae51f813597afbb6806315559a4fde3dc9acf0a2177a5048
-
Filesize
1KB
MD5f39938cd070a36c0c00014b4000f3efc
SHA15d218b6b5d4bb06b452dde5736db936bd11cb529
SHA2569cc21db4e9fc1d41c1033f303c6326a85db8721e53ea0e62846f871b210080c4
SHA512f4dbc02f9f679d639edaaf99ee6dc5c2e0fde50d4c5fa1d216a025e34bcf4f89aa73e53e07dbed71e254f928b6f80053a468d9817d233986e790b41e16cf8d9d
-
Filesize
1KB
MD548fde47f278028c90a27cd827c0ef3d2
SHA1a6a8d40b0a5f21e0b858583c6ec06758f38c89c3
SHA256dc0ac023dafc67740c3185f6b718d38fcb86fdb1780fd30ec5d1f9f1c4fb03b5
SHA512b4253c9b87d658fffeeadea380ec91cc5ca421ac2e6f3031aa1b6d512357559de28cde0729a8fdda89d90b97620e1b16c24fb91ca53dfbde19b1ec707722baa6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5cf5b0b4c7486441f1287b2ae7e4e02e0
SHA1d4ada25679dcbe8f2fa742a62283a202ca7746bd
SHA256cbe3d2ac3cb50773ec3958964492eb0ee1df1918fa6a762921e2589af6fa80c3
SHA5123d6f9fc235c95d621ae2ef757d9ea61d7b847c185e021ed105fe4acdfb410328c1cdd1d56c362d749c0b41b4d48562bf12c494b93df0fdf0f1268c8031d04277
-
Filesize
7KB
MD5b207d8b8573a9318fdfca96e099b0717
SHA18aedd561654825d8ce38d338c33a84f629b71b21
SHA25632649062974643176d0efb1ac6cea97b2cbe381997db648c2bbdbf1b564d8a37
SHA512dad6908febd46fef27c24c8a344e47764e152256ae900c77f1d1efb1d41878a959f6dc99bf6f56c6f53cfa8ce7d8929eddee429cda325b0cb9321576f30b36a2
-
Filesize
130KB
MD52ac43c2d65fb039fa772d24f3db58901
SHA1d1885ad53e56f1278f687743046eb03664942259
SHA256aacf05c4ed8980585af25dcead599157d145a079e96b7b6160fe096abc075ab1
SHA5129f5c24003ba40e46fdc518583f232f0f907c4887153043f6ab20f87147d6feab2cd1eeb95bd81cb43796e19b309eea50e230b36556eb868a154b24fef9412c07
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e