Analysis
-
max time kernel
132s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 11:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://visaliakawasaki.com
Resource
win10v2004-20240508-en
General
-
Target
http://visaliakawasaki.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133609368786211156" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1560 chrome.exe 1560 chrome.exe 4772 chrome.exe 4772 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe Token: SeShutdownPrivilege 1560 chrome.exe Token: SeCreatePagefilePrivilege 1560 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe 1560 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1560 wrote to memory of 4556 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4556 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 4304 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2508 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2508 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe PID 1560 wrote to memory of 2200 1560 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://visaliakawasaki.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0b4aab58,0x7ffb0b4aab68,0x7ffb0b4aab782⤵PID:4556
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1860,i,16412717896114569803,8096897933052247348,131072 /prefetch:22⤵PID:4304
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1888 --field-trial-handle=1860,i,16412717896114569803,8096897933052247348,131072 /prefetch:82⤵PID:2508
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2132 --field-trial-handle=1860,i,16412717896114569803,8096897933052247348,131072 /prefetch:82⤵PID:2200
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2788 --field-trial-handle=1860,i,16412717896114569803,8096897933052247348,131072 /prefetch:12⤵PID:4356
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2796 --field-trial-handle=1860,i,16412717896114569803,8096897933052247348,131072 /prefetch:12⤵PID:3920
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4080 --field-trial-handle=1860,i,16412717896114569803,8096897933052247348,131072 /prefetch:12⤵PID:1744
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1860,i,16412717896114569803,8096897933052247348,131072 /prefetch:82⤵PID:2704
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 --field-trial-handle=1860,i,16412717896114569803,8096897933052247348,131072 /prefetch:82⤵PID:4872
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4640 --field-trial-handle=1860,i,16412717896114569803,8096897933052247348,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD523f3729cfaba26c5391644c402da3633
SHA13169fcceb0ff97b65e143acea1d6e0d139579236
SHA2563358a8d660bd0d3b84b76154961d233179db48aab9e578ccf031653d71d8eaf4
SHA512a7aad7bde447f803eeff094735fcb12992a0e63b97f8ea844b78626c46fcdee09b91b380f69190f882f94a70f782a7bd9a7760f78c2cda360e2d18ff723dadc7
-
Filesize
360B
MD59d1e10dac10d13c3e5031848fefaae04
SHA11b6866a820b58493cea5fc4a83314437a88ab7eb
SHA256357ac076cc3bbb730eaad8a64f52a04b30588ac9a0001e97327330e14654843d
SHA5120d0157d826da766ad7d8080c3c13bc48120786c70f667221900d47b0f0e3494607e43c41069654e8d5890ac2d72cb7a441c203565db9c6c3aa3a67c5496e854b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_ga-motorsports.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\80e9008f-678a-4e0c-9ab5-24137d8a8b48.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
3KB
MD5fdf656322a601a22c182c640343383c6
SHA1fccc7e5eb2a588111f1c71e6a96ee220142fdcfc
SHA2561b048f48ce122cf1a37f5d4152c36d2559708be8da5db8d41de97bddef842845
SHA512d5b28ca943855b786d7cce80592bae1c909ad0cbdac9d03b58d74c45e0fb9eae4b11a292f90b1064133323a122c10444afb8e69ae725681a75985c277873a490
-
Filesize
1KB
MD5194e8f6e2dd5a42d4300252cbaf70dcd
SHA156ec4416d621f57c47ec53377ea4ade0fd848c57
SHA2568a426d3d27d38169606d11989d8b98ad6aad967bf2a7fc13e80fd9cef7fef164
SHA5128540eb3e7712d38315d9ecf5a979059bb1a904bb1583c704ff912b34933b1429d54849e1980248e978e6af226cb1fcc50c34015aaf6f69a79c56394237d667a8
-
Filesize
6KB
MD5cc91096e82df5ff9b812a3c9609f1fad
SHA13fb7faf44eecb4b044f7c151e797cd53dc4efa03
SHA256a9a13a73feda370b67ad1c70e50e509d4af9d73b97b6bf4fd18e0dd674e5ac47
SHA512cd0e9ab05866c2d944fcc765796377d3e03411a3da6d65e67d11a3897f640e84723151e78eb24fcc605128f6f042be050277fb5bd46abe4193f1261f055fec9e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize120B
MD5f9e32c17c60eda086c23676310bfa6e5
SHA1b2668dcce6e47982609fef83c5aa8c1d4138a819
SHA256721998159893b5a6f8d84c8ba867ee575720d17990366cd8397482652e2873c7
SHA5126fcb6c8d1045d5959cf8f66574cd7000a6865d00261b7680f5ff045b45e0601662edd4ef295bca186376ddded938ef96975be091368c90a24de720d5302f9a72
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57aff7.TMP
Filesize48B
MD5c42664d7a326d1b0d1a76cf3e87a95ff
SHA162e56b7a0114760dd655b4fae97beacb4843dbf3
SHA25604d63d528ed1393293dd801849af7d7e31ae2ad76cd34b2174730a5501d36e0e
SHA512bfa0df48f8d42000a8be4ad782fbe71af5e19730adb09cddffb827e4ab528ffc3a61cc008eeeb0c9bc1848d28eb81b170e6a69a88ee13cba881e0b9a148acf87
-
Filesize
129KB
MD503ebc47ab0ce022879f04c4a4a2e4f2b
SHA1ff0893df77387cf297688d95035dd5d9b60f443b
SHA256a21536d3e19b402e85a76a4f8d9e89374ee5dfb894a96615342e37f12ccedeed
SHA512039cb749105edbb7c6822153773c797e103966f6453fd8295b76460d9699f1629564bd7cf34db1d4a8dcc5380c85f5c37c6a00fc45934e77e785e3f2cc8c2c4d
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e