Analysis
-
max time kernel
300s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 23:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://qantas.sharepoint.com/teams/ETOM/Pages/Edit-Claim.aspx?editID=1132
Resource
win10v2004-20240508-en
General
-
Target
https://qantas.sharepoint.com/teams/ETOM/Pages/Edit-Claim.aspx?editID=1132
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133640045972202658" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3424 chrome.exe 3424 chrome.exe 4324 chrome.exe 4324 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe Token: SeShutdownPrivilege 3424 chrome.exe Token: SeCreatePagefilePrivilege 3424 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe 3424 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3424 wrote to memory of 1924 3424 chrome.exe 81 PID 3424 wrote to memory of 1924 3424 chrome.exe 81 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4772 3424 chrome.exe 82 PID 3424 wrote to memory of 4972 3424 chrome.exe 83 PID 3424 wrote to memory of 4972 3424 chrome.exe 83 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84 PID 3424 wrote to memory of 3956 3424 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://qantas.sharepoint.com/teams/ETOM/Pages/Edit-Claim.aspx?editID=11321⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a478ab58,0x7ff8a478ab68,0x7ff8a478ab782⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1896,i,6231263981902504014,13737878656395359949,131072 /prefetch:22⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1896,i,6231263981902504014,13737878656395359949,131072 /prefetch:82⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1896,i,6231263981902504014,13737878656395359949,131072 /prefetch:82⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1896,i,6231263981902504014,13737878656395359949,131072 /prefetch:12⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1896,i,6231263981902504014,13737878656395359949,131072 /prefetch:12⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 --field-trial-handle=1896,i,6231263981902504014,13737878656395359949,131072 /prefetch:82⤵PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4120 --field-trial-handle=1896,i,6231263981902504014,13737878656395359949,131072 /prefetch:82⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5020 --field-trial-handle=1896,i,6231263981902504014,13737878656395359949,131072 /prefetch:12⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=740 --field-trial-handle=1896,i,6231263981902504014,13737878656395359949,131072 /prefetch:82⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2356 --field-trial-handle=1896,i,6231263981902504014,13737878656395359949,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5c378f6ec8911b934759922c3f67ede22
SHA13c4f6d2cf7065123931d22d6934254eed14a6aad
SHA256af99aafc7152384a2160a865c07d67b30825a46b8db3233d8f1ef62b7b362881
SHA512803be7dfb63ee48dcfa9b0b88613a39dcb3b5dd1ddcb27d24fcebd50b75a1adac56482e5a8ea0d6752aa7eafc60164c43ef6993d2b9744c471ac0a54f198194a
-
Filesize
72B
MD56b6a55652ea9f1b319bb1078f84e6567
SHA17ce412dd6dcc1843e2f80a9c1fe7cf3442fe9f37
SHA2562a2fb3d659fd35d2aac6bdcb0bbd22c5e96120eb295f70b9b6610bd057d102d5
SHA5126131b988ad781608d7499953d8e0fbe859747b4d766533d0711c4b4c74d7f505110c2a8970bc3a690ce7019e045bde59549b5e261104257e402053a677ec4303
-
Filesize
1KB
MD59e1c059d99cc64aad94d813971a453d8
SHA1e5dc6fd2ef34173c63918b864d721a3e8343dda6
SHA2566c41214b8252b17308f40b9141a94ab220171712e1a56158217f1d4c30b05771
SHA5120c1989cf1e18d3b6d03cff7e4061181ed5e4bd28faa90b941ab50b75c1085f756d602cea382f20131555169bd2ef3e3897e96561d29e8b8915aee5060963bd43
-
Filesize
1KB
MD5c012b3d9d384e74d0b2c6bc7417dea35
SHA1b8fd177ddadb9a1cd80be29624722e0f9714d856
SHA2560b141037dd474d5237b1cff3a1fede7f5d6840d64d8ec5c8883cd21734f77140
SHA51221413a8287cb2c25c235b8e839235c56fdd47e00b0c0ea683ea555d2992843c05f9cdeee9788903b0e70549407f36e1753db3422d62df9f98a6d9def9ebafde3
-
Filesize
1KB
MD50b6e415358eea7a96fe9c5e03a9840e8
SHA1387e7329e5648040ea6502ed2ee9b6309c4da793
SHA25614aa3e2e2e7d72492ed8a767de5ee1c16bd87ae67512dbd29f82469caf6bf110
SHA512ad267b64585c2d3e3b2e0d0e1ec375c46d6a1adc1f4796ae59ab98fb77cb3d86545cd8f0ef606ccbf4fd49e35170e24ea0fd8b045b17826bfbcfe3dba11aadbf
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD5de5cb743b7c4abefcc2b526bd06a4be1
SHA1fe3314d387463e7614bc3649898cba5c5c228097
SHA2561d75041342f0bd2400d3f0447beb4c4f309663a9acf13f55f52bbc8b210b6c86
SHA5123d8ca12c4aae677817c598addba24ca19dffc647c07e54a87a5b59288ba6e86cdc1b78c99eeed4fd2a87e97746a765a22ab40199ac594e876ad8cf6e99e3c8bb
-
Filesize
859B
MD5948d6cc6046da5c104e40d6db0aa34c1
SHA10140108e35d58a491ee9fa25492e2fb69afed4ba
SHA2569edbf108c09f6402e1fb35389b7c4f206b551351fc2b281228311ac91585aaf1
SHA5120a010283102a44fb381a63d3c0d408b32865f953457a2dcc31e4bf371158a5cda9fd3ee3ae68fc1ca3e047a0e6ad5b34c72b8a0f3f95c96a16332c32ca03bdca
-
Filesize
7KB
MD509304c767fdfb5ddfbc421e29ea46782
SHA16b63dcadded9e820f783d527225f98df03fdacc0
SHA25658e0635d5f97f90d10dcb5d396f42c909e639c88102f490f99bf73c669369676
SHA5129687a9983ab352e0f304fb710416322a7a7234c98d985eaf2f34bc15d603b1e1c9371dd3b6d58a449a3e62c99199d7bdafc565f1c4c7f88359ff977ea19080d7
-
Filesize
255KB
MD5900e865d596ff4937e7a1768dc01a5c8
SHA145ef603b7c98a5faca497586473e0f8611f5a067
SHA256bb999b477715f6103724e172c9e7910ac70f43432e7409eea879358ee67505c3
SHA512d499d9061a67ee91764103dc3be6afb7aceaa94faee292df096497d088ca3b08c192b6173a8eeb446eaa8fe39dc2d93a998fabc1e9732009d9765818f998a6c0
-
Filesize
89KB
MD5039907a6589e961cbb07ff5340ea2594
SHA1795f1418b1e9f93809008aa877e427d956459ac8
SHA256dba841cb52577a576d3f9b106b57022aa20b4967eea323e08c122249c09bbe88
SHA512db07e046eaeca085e363d0f91e20a0c0f4b4d0de34c00c6b945e42cdbaf97dde0a4d643409188d15c885f6bf41cb3596668fc9c52c615bc07c3dc1fdc4115481
-
Filesize
88KB
MD57cf275f42bcab3821650e406b83dee43
SHA1f8acfc1df4632a3dfde075546450cede3750570b
SHA256938ca515c9beec212ff46da347102bb29556755119b9f0071a981d5b0377b424
SHA512f227263f3a1aa7e7c75cc847534eccf7a1b0432be3840eab63f3e3ab948dae5f8157cc6800c087dd114ab10a88bca35ba3e77716556f2176fdbc4f6568e6949e