Analysis
-
max time kernel
210s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 14:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://go.microsoft.com/fwlink/p/?LinkID=512132
Resource
win10v2004-20241007-en
General
-
Target
http://go.microsoft.com/fwlink/p/?LinkID=512132
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133765882299916272" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3872 chrome.exe 3872 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe 1104 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe Token: SeShutdownPrivilege 3872 chrome.exe Token: SeCreatePagefilePrivilege 3872 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe 3872 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3872 wrote to memory of 4664 3872 chrome.exe 82 PID 3872 wrote to memory of 4664 3872 chrome.exe 82 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1780 3872 chrome.exe 83 PID 3872 wrote to memory of 1096 3872 chrome.exe 84 PID 3872 wrote to memory of 1096 3872 chrome.exe 84 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85 PID 3872 wrote to memory of 1748 3872 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://go.microsoft.com/fwlink/p/?LinkID=5121321⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff93e5ccc40,0x7ff93e5ccc4c,0x7ff93e5ccc582⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,17406811479505371797,5137646022493894123,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:1780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1644,i,17406811479505371797,5137646022493894123,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2168 /prefetch:32⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,17406811479505371797,5137646022493894123,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2448 /prefetch:82⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3028,i,17406811479505371797,5137646022493894123,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3032,i,17406811479505371797,5137646022493894123,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3636,i,17406811479505371797,5137646022493894123,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4448 /prefetch:12⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3464,i,17406811479505371797,5137646022493894123,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4680 /prefetch:82⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4820,i,17406811479505371797,5137646022493894123,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1104
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD55e2435f70e37bd95817999ccf9bb6a2c
SHA1541c3b459a86e8dcc1084e1d915b1d2cb9f4a36c
SHA25636a18012dd260b1e0a0a23974e99b8e651e3b9168f091da6c62432c3cea4a305
SHA51235341de8d934581ec6f24d7cc3a7efd060123f8e8fb525290eb5f33535e871e3e6b922541f102725df319223c48f93cc4a19cee690604964710acc875b78ed9b
-
Filesize
312B
MD573152bb048f55054eb690b09be80afeb
SHA1fa92871287ff3651cd7b242779d4c58db4634f3f
SHA25603ff1c723f67be9a57949cf5b8944c47a5da0f51b383b3a2394fc0a34c2be71f
SHA51220b29c9a4560352899709c73025830683287a83242aae6b3aa78677aca17b3b726c2b46268ccc8ac362510e58cdd7995ef47ee7ce99e06e8f42051e67917c07d
-
Filesize
1KB
MD5d4fc707586c9657e6a05395b2b95d250
SHA13dc9dfa70f49a985ac8618394402772a20547e20
SHA256274658b5eaac403cafdf19ed1364846a9f2ee9dcabb679e439af9eadfa9b8ea8
SHA5127f12c1744f04c8ccb0440e7bd050ba9168e64665b68adfa1bc5d3d20b2079833aca80ca242759e43f6f77c46002d6eb4373fe79d8e57a378ae788ee670835337
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD53ef8da73a3a33cc0f8e0217b27f8d96f
SHA14064250d308e61f5165799cd320d6377c06a3d80
SHA25626cf70c93cb2c020cb5b868543bf70b2cfa5088e4d991c704b47639a2f429ecf
SHA51269306d661f23a2be96e7c0c7078aa1a16b8244c8c3c477f4956e7c65153d888ef4ce33436b90366817d1184e380ff06e16aecddb04f327b5da841a3771ac9f0a
-
Filesize
9KB
MD59ec29c523d695bcc758627e38ae2b19a
SHA15a04c817ab34e96880e44002d432c094ffa17e6a
SHA2569295147cbe3215bedcd9d1bc935c6161072d2de7337ec9c751ce299b69acf24c
SHA512c1970fd48c3e89f12cc8b297eb15616e16db8228f3bf1d3cfa7772e2e5cf52064e7c15ad7545dc872cd1ed80af96f675ab9dd0e721ba50bf29d2b8576d3a300b
-
Filesize
9KB
MD5b155c2be423fef70603a51044fe0aa34
SHA1a01c40591d6de55d06385f97fcc7b90819407e25
SHA2568a4b7a5eb122212e502dc47611de0648e8e792391e726294d475fea4299c7088
SHA5128ce5925a36e43daf27d30715cf32079a1a51a6ada13daa2aae3ad652ed957b1606a052c4665fd33d7bc8d66d5075bf576b1c543e6601b811469b811fb31b1fca
-
Filesize
9KB
MD592301b7aa3592f3034b173a219b5334a
SHA1ca34c62311794c694e863387c293b900bd9c4cb3
SHA256c02b7a71a19ea2f0f0f30df148eb407f9f23b7a64aeba79a79e313a08772c006
SHA512b5a86d5338fd7788f69024613ee0d35f5577cd09d9c1aba393ff52179136711a13b8e9cfc0fda3010f93ec1187a3d591cb4860b83e186034d31fc4c560d82f26
-
Filesize
9KB
MD568a5b06b81bc433c3152a964e112e60c
SHA180a9a39dddecba5e5c6b8338d0664a2f731b080e
SHA2565e44d6cdc29c87897e1430e681d48f4e13ba278044e03df7ddc811e8a0d64ad2
SHA512d702c2a02a08a1f5ceaf04490b2299840a548666e1dc632a64f85adacbab9a2f6a0ff62583d0f2bb2d6c2ea53ee9cfb15294f0ab29487b4dc2be5bdecb363317
-
Filesize
9KB
MD524b4623212f55cc65322f83881fb619b
SHA1bb55361ee896f204ea12a401bd431642f9894fbd
SHA256f392efc32b2da1fc66cb700cd6275b38e3fe453fe05257a3f4cfd02cb4e7721f
SHA51257654d39c2c726c2d81242cd21a4db8c97779fc0e4736e5e13d129a567111368b35839ce875e4a5d6efd41301c69f02f9c5599df0e7783dccfb8e9916709f542
-
Filesize
9KB
MD50b830060dae97692f3a6797a30c9e89e
SHA1ab2291290233e7a2e67f8fdafa5e256e27caeca2
SHA25690680fa2b6e2c58adddad3b774a795642575c8d23d4d77cc2a810d740c5e299f
SHA512f75414e2373c6b56ddf9f66886cc0de4f6b2573985d8399a487371ddaf6f9316bc176d52e46b43d0e9586b7659efdd269b798e088017b519786ca63a1366e597
-
Filesize
116KB
MD5832c6ce833adfc882d785de0ec3b0c23
SHA19edfd19a6f4001d4f36c578942203f0780ed5377
SHA256bea4ad0942ba4c3e0c2b5eba018eec957059bac35095a1c82d6634af2a36a246
SHA512c6c2a51df0efc74c342d1d986905839af49e80334da4e311c46e5535e655f30edb29ad3e23da7ccf106dcb928e67871160f9dcc2c97e02952cbc97061c6d81e8
-
Filesize
116KB
MD5f185111cece22ef37dfc15b441f7bd30
SHA1f66c3e387a1787d14090d0cb0541e56a39c0ce3b
SHA2560409cf3a33917e874406da902e41c92991ea9d6ee2788094c30077a7910afaf6
SHA512e2f45168cdaec08b4879d205cd984a255a94c26a4eb8f703d7e3000ebdbf5e7aa3fa63d2ff0c7bb748d8f1c12e64989894f46450b40eb786ff48651722c34228