Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
depart.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
depart.exe
Resource
win10v2004-20241007-en
General
-
Target
depart.exe
-
Size
779KB
-
MD5
6722267e4f2481526d50268a1f76bb19
-
SHA1
dbc2f0cda64c669033b00ff0626ac2ff154a795b
-
SHA256
5d1fea5a52d27716f24dd1c6a02dc30c7cd7e4d13ecb0dc93b0f5abf8422851a
-
SHA512
6b9f5a7cc9a1cb552e3a13b4e5886b18b0419da768b671ce3cc0806669c18704a0dbb4ae48e165aa849a9f43dfa46af55baa320b391df038c811af7fe0899d5d
-
SSDEEP
12288:PIlZMGqV8SJIRV/eh2K6KTXOSJXpRdPYhcnQdFhYqVH9:PkZMGqV8SJIRlmPYhcQTh3h9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133765551188313429" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2028 2592 chrome.exe 100 PID 2592 wrote to memory of 2028 2592 chrome.exe 100 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 5052 2592 chrome.exe 101 PID 2592 wrote to memory of 4484 2592 chrome.exe 102 PID 2592 wrote to memory of 4484 2592 chrome.exe 102 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103 PID 2592 wrote to memory of 2820 2592 chrome.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\depart.exe"C:\Users\Admin\AppData\Local\Temp\depart.exe"1⤵PID:3080
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffe0abfcc40,0x7ffe0abfcc4c,0x7ffe0abfcc582⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,1807379735614743609,17596893442674484400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2168,i,1807379735614743609,17596893442674484400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2152 /prefetch:32⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,1807379735614743609,17596893442674484400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2416 /prefetch:82⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3144,i,1807379735614743609,17596893442674484400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3244,i,1807379735614743609,17596893442674484400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3700,i,1807379735614743609,17596893442674484400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4596 /prefetch:12⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4816,i,1807379735614743609,17596893442674484400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4860 /prefetch:82⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4160,i,1807379735614743609,17596893442674484400,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4504 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD525873caa5c79b1f537a5c1d72e55e583
SHA1271481370f798b66ffa71d5cfb5142cf4a69b78b
SHA256c74d4dbc717cfdd67c46aaa484f04fa24f2675cac4b560c9101d80887ec51c8f
SHA512ff1e893562b8637d008426db514d2324bdbbc3b7be0cd0da9860f56316769776117c353819225a1efab4e6b09d692aa0a9a0e940ee5ecacddb65691c6872780d
-
Filesize
1KB
MD55336fb40e3734b168e080e05ca32a570
SHA1360a6c02dae69224130517fae8da625523d63120
SHA256677164e57e99b4a9bf042b1c415fc525566612cee2d18e7e15924a988c59e104
SHA512b6cefe3da34ea6b9cdbd865a627898d21ab92241256efef862f144a7536a8394ec485d4c9c2dbe6b350266c9cf94f278970337237f78e4a3b0ba4f92e3c05961
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD58af55bb9250fb8c7b6439a4cd5305ac1
SHA19d83d145e0186a82e3777f51e4a512e670bc1b0e
SHA256e4bddd406fa71cfb60805337cb9cd13566a523393adfda891025656c216a2ad6
SHA51203e36f142a1bc8dfe330f1264c92106500e540786c44c05accd8d480de3e4a4ba0f7f5307d528c307e77cc3ba9d0d3d2a9bed536415a536aac93c5b8ae64e020
-
Filesize
9KB
MD583f507ed6342ff671162197219d66442
SHA1d7a59729de1751f258c11ecdc4e5943b77a76113
SHA256776ca88fc3f7017aadf01f5279156ed7e994992c7ab435a0fdc9c0ae30af74d5
SHA512e8b45897d108906f030a3a3c1eef0cf7d95a0c3db4924e339bb0282e9922e3c4ee9ea9ea94c52964fae708f1a4b0951d6946b445be5aee0aa847a52bdd7d249f
-
Filesize
9KB
MD5339914c11f011a343481afb1ddab28fc
SHA1e4603b6d867b66d07a292a33aa8c176a1c7c152d
SHA2560e2eeccc3cd1f330f9d09b67cde7c290cebbe86c32cd7011400d241dd881fdf6
SHA51277cf1884dd30ecbe957d3466b88863c720040fffb401c546a924b1f92a6fc2fb47d4b7e87556135c984c2a9328ed4a5062081fd95da0e0f35a11f8ff84176a1c
-
Filesize
9KB
MD5b59631bae9c784cc79b425dd2720c7b9
SHA1ee29f5766f4d8e3338b53902c847eec86ff90944
SHA2569ab6f977d2bade9abeb3417d01334c13a057a1057d904a482e979762c755618a
SHA512976ce157c9980ab58319fd691b9aaa2b157d753f6fe2f8c0033f88625ebc0e7699107c74a7d0294048873ebca2fa18f9f9764da53a62ada4298082198b6cd1f6
-
Filesize
9KB
MD52f80e85c3276a2beb160263398865af7
SHA1ea9dbca407e9db31f6bedf245161180fb8528d49
SHA2567d8fb0acc7bc8e5cd0cd2e226107da652e7ca53c9e91ad18e578aca59aa7ca8f
SHA512526e175de869bda8c125e7a0c93896a9433a8281c99909991a91f1baa546974b78e5903708f16f46cadab9a1bfade364eacab31fe120636aa9da5d4866003330
-
Filesize
9KB
MD56eb99bf88527d897e7ccd9a35a2a6b56
SHA1cd80ca3c6ae7ccc3603fb860e81364b3707a730a
SHA25695f723150bbe4da7fb608124d6255f36bc7c5c4095a3c5d06236cdaf89293726
SHA5121bc9b8f8958ade8c410a8a78d19154af423d5fcedf640c9b7dc841a907d41a9ee509e8f9c7442caee91b8fe7f8816a56b504d436887ec5f1ca53cb8470756624
-
Filesize
9KB
MD5548c3c685bb89424caaccc8f1ebc78f6
SHA1cef67e6b6ac80ff47924373ec3f8a183d4d4e5c7
SHA25617f92adc14e56eddbec7c803d2c64c99fcc8d7089cb9019bd4bd4a122a9d1643
SHA5124dd63af46b4b5f2cd11cf09825afccc83211b7f166ab0712993f15d061cbcf8212db44d160b6c2a564c051dc9037fb4a13690aef7f491f4046c18d8f1e45615d
-
Filesize
15KB
MD552afca29fa5383d339c9ecbbc4a26530
SHA17d9e9b4a4084e1205fe2feb12fee519e166cd360
SHA256df9b6addcd21707c3fea760a2e12e475520250d59302dd1e745143b274d3152f
SHA51251bb11fcadaab0a87d32f0a1ab221a46772fba17d08a98b02f9968ca98364dd2d3e7e2c161df7a393cf4d31634b3bdd4f71578731b5434eb6dab236c6cc395f4
-
Filesize
233KB
MD5d13cd59c12485056642daadf9505f2ca
SHA12d10919e4d60055d095d3148f018e13878aebae5
SHA256f26c26ac47cc57e916fdf673627f8dab325f57ebe84f9807117b48040fb99ca2
SHA5129671c5aaa579b66ae5aad7b3cdc8f9d256dcf12a5c71d8491c75464b87a95d5cb7eb671073ce2978c5e09b2e201f776468201b2bfb8fd90ef144b87c2c9f73d7
-
Filesize
233KB
MD59617adfb781f4b404c69b0c9837c9f73
SHA1511804019a320c370eba94f60ea1b3e44ef766bd
SHA25641b0f15e2749244fb95fdcd24dd502fa4fcc3542f8f3a3d9d3fc8c27cce792a8
SHA512324539c5d88adee29c20af4aec51a883a2579bd369e3af21739b236101fb3eec7153333bfd5680c81452935b69ebdfa9d21896a1e7eb4f62fef76e75399b0d75