Analysis
-
max time kernel
57s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 15:33
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 4 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133673456474927319" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2680 chrome.exe 2680 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeCreatePagefilePrivilege 2680 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2680 wrote to memory of 4820 2680 chrome.exe 83 PID 2680 wrote to memory of 4820 2680 chrome.exe 83 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 456 2680 chrome.exe 85 PID 2680 wrote to memory of 5056 2680 chrome.exe 86 PID 2680 wrote to memory of 5056 2680 chrome.exe 86 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87 PID 2680 wrote to memory of 1152 2680 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://sc.link/rT0hq1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff8740cc40,0x7fff8740cc4c,0x7fff8740cc582⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,8201823087541056609,9648871382778320720,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2132,i,8201823087541056609,9648871382778320720,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2168 /prefetch:32⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2212,i,8201823087541056609,9648871382778320720,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2408 /prefetch:82⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,8201823087541056609,9648871382778320720,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,8201823087541056609,9648871382778320720,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3664,i,8201823087541056609,9648871382778320720,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4500 /prefetch:12⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4256,i,8201823087541056609,9648871382778320720,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4464 /prefetch:82⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4820,i,8201823087541056609,9648871382778320720,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5088,i,8201823087541056609,9648871382778320720,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD597b8344376a4ba633f8dc37d6aed1602
SHA14b1ff152d090821da3416df0f16dcf11aee35938
SHA2567671e5c160c3f8e92c5cc5f8d8e002e3fcd66c21526fe27a00299cfff7432dda
SHA512f4bdeb777aeddcab708861f3bd3e80bcfd074aa4cb9e8d288792f253211d33015f9d9586cc4729077d768eaf3f0944369ad1d5e636e40ba8412ec47586d4eeb5
-
Filesize
40KB
MD523dccd50c1598cf87c321dd0e788e2e4
SHA14697f41531098e96b97de4ca6626fd86621efb1e
SHA256167b5e3d2fc6a069ef986144f71f70ca1ed8c4332846757c8aa4792703420635
SHA51200174629a41be7b3d69e0ef03041aab41adae416c39209934b8a9c3923350010ddf01ce8d37cedd6bd57769796b41ee3c18c1b393726988039b556416c20f676
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
860B
MD5df6bb4e125992f6397a6440a269efbb0
SHA1187a2a072bfc234c0af087caf08852a00cd3301c
SHA256da7cfb7e6bf0b78ab48387625e36dcbcab5d903ba1440b511f1a97af57abdc93
SHA5126e42a7a37f87b7346106edd8df3743fa3453fa3a4ebdb9a5b2a19bf6497e958b8a1ad227491cec772ed7273305148ba0301cafcc37a12c6b081ee317b1f952da
-
Filesize
1KB
MD5bf326fa9c05f9ecc8558c754b17ed97a
SHA1a7802aa99051ab45e366f818c3c31bc96b4ba321
SHA256e6c1364266b4b762dec5812277cd81c4734033cec0e9220baf7c6a97cc6efe0a
SHA512c4739ed2930192f9de315a194b9e3c4978a94e18421395059ca28286c0a2c8ab35c08ab9e5b20689a5c279ab6bbc1aea4f697b0a14d4d10a94d056313e75cf2b
-
Filesize
1KB
MD5337b54e7ac758e01506f36f9c4bcba7f
SHA14d6f066cff73e395f5e4e8cfbc951443a4859949
SHA2567a2a24af497cce11b273bc51a7e580b9bef42790b5cf7a7aa17ed6fc4ec328bd
SHA512c2503b952445b401f01d3d9e0945d7d36d88fa990f864ed289e65f18c2a6753a83f4173c9a65553b0d4e2e21bbcb540ef225ee1a7648803db5c9f207ec458974
-
Filesize
9KB
MD593bebeb41901c90864d8c238580d2fad
SHA173d77cb0c6a829ff28b8a43d56352fc370542dac
SHA2562f433490fe8d5e8a74d09557f5967c98447c3a4a9cccd765ac3dafca40125ee9
SHA512ca09adeff72e6c7fd03978b7d2dc8299746157f97165197515daacdafa24d3d4760300db4c958f802caad8ec74b1089fda4a42df9e2d1a3c49b55f58ac1083d0
-
Filesize
9KB
MD5ebba022202b82b67d7f366f5f9ba6b2a
SHA1a3a73a097b89dea122576b13bdc724e0ca06f83f
SHA2568a69bb51f603c18d0e998b0a4cdc516d7e6d2fdd7ff7a6e77dad405e95a7b289
SHA512417fdf06a19a809c935979efff9c66283fa48a692d176c8b7f99f4f704483ac9f82cff3cff0158a922ce128f5ba11fa25a124508a70cf3b528b092f0f4b684f8
-
Filesize
9KB
MD57c4a3f7526345aaa46c9c2d10cd452b8
SHA14430fa7dea9358e787d9e814ed6cd36a5c17880f
SHA2566449cadf2ee16566ee208c7c777c3c55f0a07e365e0f10f322617a986c414bce
SHA512d56c32f62c419bb926874ba18c58e893f495eff3166f0f93991001970e59b748dec5f95a1bbcb1ea81d5e534040a9dc914453193bfd6ccc1c9c24dba2b33a689
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ef5be7bd-0c6f-4e86-bb88-cee25ab012a4.tmp
Filesize9KB
MD50cef196aef479dddfad60345a8bb44af
SHA18ddf839a39c758a979a4caefd52f5a7e46ff33a5
SHA25652de10d6b4c3c5f8acaecb9c61697703b5701cc33b786fe6f6dbedb03a7afd02
SHA51246c5c101e1b9c09e0a89cd13018f312990b0f038215ddbc1319b72d2d0ff148e07d9448935a37b08c16cbfb1b8ef21e2aa2cbb3351855a0718d9418c2b3f822b
-
Filesize
99KB
MD5a5a8776eda9cb224dcff8056216c6e18
SHA10e0b7a2fbaa33c77b7dbc15d964b787336a8c59a
SHA25616b4ff069b4c11e2a7e2e7bcc0da7738f6868ac6e74fde4ea0b2909e06c1c6fc
SHA512a2f5f5842cf628c1d3402ebac1722f27f5c6855643de1ae24a56a335d62143e53a42582f36b397a8d219f3417a17155c40302668675434aabc34392cdf5552ce