Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 16:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.monkey-seo.com/moz-authority-seo/
Resource
win10v2004-20240508-en
General
-
Target
https://www.monkey-seo.com/moz-authority-seo/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133644978276978461" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4092 chrome.exe 4092 chrome.exe 3788 chrome.exe 3788 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: 33 4592 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4592 AUDIODG.EXE Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe Token: SeShutdownPrivilege 4092 chrome.exe Token: SeCreatePagefilePrivilege 4092 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4092 wrote to memory of 4180 4092 chrome.exe 88 PID 4092 wrote to memory of 4180 4092 chrome.exe 88 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 4576 4092 chrome.exe 89 PID 4092 wrote to memory of 2500 4092 chrome.exe 90 PID 4092 wrote to memory of 2500 4092 chrome.exe 90 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91 PID 4092 wrote to memory of 2924 4092 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.monkey-seo.com/moz-authority-seo/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde3d3ab58,0x7ffde3d3ab68,0x7ffde3d3ab782⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1896,i,14949896878673568410,2500483178344162912,131072 /prefetch:22⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1896,i,14949896878673568410,2500483178344162912,131072 /prefetch:82⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2264 --field-trial-handle=1896,i,14949896878673568410,2500483178344162912,131072 /prefetch:82⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2868 --field-trial-handle=1896,i,14949896878673568410,2500483178344162912,131072 /prefetch:12⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2876 --field-trial-handle=1896,i,14949896878673568410,2500483178344162912,131072 /prefetch:12⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3532 --field-trial-handle=1896,i,14949896878673568410,2500483178344162912,131072 /prefetch:12⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3136 --field-trial-handle=1896,i,14949896878673568410,2500483178344162912,131072 /prefetch:82⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4512 --field-trial-handle=1896,i,14949896878673568410,2500483178344162912,131072 /prefetch:82⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4588 --field-trial-handle=1896,i,14949896878673568410,2500483178344162912,131072 /prefetch:12⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4712 --field-trial-handle=1896,i,14949896878673568410,2500483178344162912,131072 /prefetch:82⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1896,i,14949896878673568410,2500483178344162912,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3912,i,15721081447618313297,6839074028983272033,262144 --variations-seed-version --mojo-platform-channel-handle=3948 /prefetch:81⤵PID:1696
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x480 0x2401⤵
- Suspicious use of AdjustPrivilegeToken
PID:4592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
1KB
MD579bc72fe3f19e51a2d67dc619c587cc9
SHA170873d84ac0c57949426b3ca7778e32fa3d1d0d3
SHA2568b2fff05cb750cda98218dbbefbf5dbb3b468bc458a604e54bddde79982191c7
SHA5128d304c36cb7e9494501dcfb35fcd81521f354c0fa5fb9fcb4161f74260e2e52e731f5475d35fa342634cbeba418db31632a19569a727e014ec2733e745a29005
-
Filesize
1KB
MD52a154138eb6304a3f58b56c588c386ae
SHA1fd471760e6dfedb2e910b45e07ef537158c18edf
SHA256cd4866eb7ed74a67a446eebdab0e47043044ac4c26f8276b5f52c8174018472e
SHA512ce6a7f213f0f31073a3f32f78f0907cd180c818e5a4e12ea05fd6d5caca6efd4378876862688a81ee8cf0e5277cbbd7b6b4841cf1ce1ac39926c241558c9d560
-
Filesize
2KB
MD5f0b514484e4513f38384b602299f086f
SHA15cf62ddc733b973c5079a7fa779a2a6bd5009021
SHA2562739f2127ed46455c8847567504d162e9a6444998b36a310b26f6d5c37cc860f
SHA5121afff49146a4c37fef60c75443c38602ec3fe49a73122208f84957baa4c3d9c9a0577cba12b0e3948cf33722aa3b8f3b0ec8cf2ab907ab1f4e23b9000f34aca7
-
Filesize
2KB
MD56532df9568d7872fae2f402e7e23d1af
SHA1f34d95258ce1f7aa4ad19b7b51a0a464df66cd89
SHA256c8ba639a5895215f068e231f11c5124c84cb8d2cf8d8eedff393295213f97727
SHA512b46a6c552fdf994d00dd8720537543c38dbe3d5be3dc3c24d392cc2b9d1dd32de9ce59f9ac533d5b4cfc3b5b73a3a8c8d23a12b5347a14613cfaa3383a2b1551
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5fc3efb4a400d23ddfe98e135288d634e
SHA1d751e0f1f7499798518b088f8bc7a6b450e408ed
SHA256786420e050e35974f4bcab81459927c57ace4ec128553a88c686a12666641bae
SHA512cb6551180f8d4d63445830e685df8803df00fe2ee27f4143f17d04d53743a495ad2e89079ee6e95c6907813c7fedc72fede01fe5980a694bec6f40051cd962bf
-
Filesize
7KB
MD588acc4a3c7d5817331005d2a18eed438
SHA187a928a4267963b8b506ab04dd8cf092c8ef4136
SHA2567cb1c7a796f5fe26956a11bca0b1a5ec440e3d45a4c3dac0e58161e04167bea3
SHA512de6ee760660f9ea7951bbc701d5b85381721551e9df62f93342e537a0d0544fef782fe3fce41d0c32ea585995be958087ecb1e5198307da7f019d08aead7e416
-
Filesize
7KB
MD5ec5d2cc37f5b8b0884a157179d39ad84
SHA1c106d2f9a313e7974a3d2838e2b1354300e18b29
SHA256dc4ca83d20c7fc949483d24b10e973319f294e96a8b78b5389e3f544f73b5f6b
SHA512476193d130656f1139a6c4ffea4058def9ea642fdaca9c02296b60576ca12ab216799958ce16e9d6ea5d13a1ffeb7f71d40f6d547adaf2178d1dba486ffb6540
-
Filesize
255KB
MD5f8d9846f3e3193e3e874f5da7ac3a53a
SHA10586f4df4850a03f3a2cc25bf7ce6c5527d8de90
SHA256bfce50da69a94024e559d0ae18afcaca6c69ddd1bc7bb45e203e004e6b3a81b5
SHA5120f56b515525bdc6cb8611314aa8b36f6ff0fc555c21f878c3a07f6a3ef33cf2f6f7831e0861fa596bc9a7cd6c4a4d8ac4ab52cc70861ad5104756d1b2f1d9e22