Analysis
-
max time kernel
12s -
max time network
14s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
21-11-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
https://www.revolut.com/en-US/
Resource
win10ltsc2021-20241023-en
General
-
Target
https://www.revolut.com/en-US/
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\f664d71e-7b33-4a8c-a712-3d24ca3789c7.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20241121130652.pma setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 2300 msedge.exe 2300 msedge.exe 3760 msedge.exe 3760 msedge.exe 1724 identity_helper.exe 1724 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3760 wrote to memory of 1208 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 1208 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 4060 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 2300 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 2300 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe PID 3760 wrote to memory of 3648 3760 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.revolut.com/en-US/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x124,0x134,0x7ffa301a46f8,0x7ffa301a4708,0x7ffa301a47182⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11411352942541765741,8426844183911470264,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,11411352942541765741,8426844183911470264,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,11411352942541765741,8426844183911470264,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11411352942541765741,8426844183911470264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11411352942541765741,8426844183911470264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11411352942541765741,8426844183911470264,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:82⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:4736 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff6fb9a5460,0x7ff6fb9a5470,0x7ff6fb9a54803⤵PID:4796
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11411352942541765741,8426844183911470264,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11411352942541765741,8426844183911470264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11411352942541765741,8426844183911470264,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11411352942541765741,8426844183911470264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11411352942541765741,8426844183911470264,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:2940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56dda6e078b56bc17505e368f3e845302
SHA145fbd981fbbd4f961bf72f0ac76308fc18306cba
SHA256591bf3493eb620a3851c0cd65bff79758a09c61e9a22ea113fa0480404a38b15
SHA5129e460013fd043cee9bdbcdaf96ac2f7e21a08e88ddb754dddbd8378ee2288d50271e66b42092d84a12e726469465185be11a6fafab6ed4236a244524bd60f502
-
Filesize
152B
MD5f6126b3cef466f7479c4f176528a9348
SHA187855913d0bfe2c4559dd3acb243d05c6d7e4908
SHA256588138bf57e937e1dec203a5073c3edb1e921c066779e893342e79e3d160e0b4
SHA512ef622b26c8cee1f767def355b2d7bffb2b28e7a653c09b7e2d33f6468a453fff39fd120cacbffd79ce35722592af0f3fb7d5054e2dca06310e44dc460533f3d8
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
5KB
MD50edb82c5469d450332e7d79b42f91761
SHA190c5dcb66c24a52e15ef93f1b66ba219caf986c7
SHA2568ee14c0f5937bf940da6f53c927d5cb4fc465bc944c781799134493f8580874b
SHA5127f09e2ddeb3219098268a9b661ef613de64a2c2e975b1c0ec4276402370c31f1ac637ee28e283693ca798e8bb7ffd85ef812f39bf646afa20bb57f4f4da11533
-
Filesize
5KB
MD54ebcb7565618cf109491ca9a814979eb
SHA14d401f5a0f96eb20a006f2c643e0eb741e30c565
SHA2564e45c62c96c7d582c7ea61ea2aba3ed79db842f4e2bb22f8002a8e94ac7d8f90
SHA51279d24a480d23e1288cf76d227ca6e3586db296dfcb997a521b7a595fa60dc54463fa9c77f1639fcbb48990ca8dbe8cbcfcda3dc5cd2cf06fe1079f80715bad46
-
Filesize
24KB
MD590cc75707c7f427e9bbc8e0553500b46
SHA19034bdd7e7259406811ec8b5b7ce77317b6a2b7e
SHA256f5d76f8630779de1fe82f8802d6d144861e3487171e4b32e3f8fffd2a57725fb
SHA5127ad692bce11aee08bf65bb7c578b89a4a3024211ee1deaf671c925d65cc016943f2caad3d57b365e16d1764c78c36cae35c3c45cef0928dd611a565b0313e511
-
Filesize
24KB
MD50d8c8c98295f59eade1d8c5b0527a5c2
SHA1038269c6a2c432c6ecb5b236d08804502e29cde0
SHA2569148e2a2ba2a3b765c088dc8a1bdcc9b07b129e5e48729a61ebc321cb7b8b721
SHA512885a734a97a6f8c4a8fb5f0efa9fe55742f0685210472ed376466e67f928e82ddf91ba1211389d9c55dd1e03dc064aa7a81d1fca3cf429fbaf8f60db8b1348c6
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD5b6032f56447f336e7fdc17f2644cf94f
SHA17dccddd51fcd6489c409ef3627f3d3865d4954bf
SHA25665f645c5d619f10a90d43028b3ad4f1f7188f38118318b3d85f7df830abd3e23
SHA512f74dcde22f5b1c1385dc12b485c0390d71cd237dc03176be6739285083bbf0c36d5adb2f527a9e59ccca671d3acaaece6d2cc3afd816cc16cb19515d4a898751
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD52954bdde3e01e572fcc6f4850987e780
SHA1fbe126114782ccb7e6c8a135c2709850497b8cee
SHA256fef5294a84b80ca1fead69e0ebcf1807197e5c9a0bf13996be6c489e8c13b0fc
SHA512d6248d8db9ed4f4ac7bad82a5c89ca87d1d6066907187dae6253098a615fe23e33932c2f2eaabb6901efe075ed0035fce4182452de194629c97055efab97c2ba
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5660b6813c90ec6ba34be818542aa0398
SHA145dd417fad8eb4de39f87af1bf816ad0ac0697aa
SHA256a91289841b05d8f4613459f2edd8df0d7a8a0454231c8eb6e69410ce9c36d316
SHA512918beb9833b7dc9b9770e84b359f7e29d9ed1736f1e072974700860d34c23761cb2e9344dba8fc783286d889c2f0fe7421d5356caea363476237f2ca0d2e5e2e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e