Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-04-2023 02:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://click.email.active.com/f/a/DgjjM_K44d7kmu-4P8hZHA~~/AAOtGgA~/RgRmGWkeP0SCaHR0cHM6Ly9jb21tdXNlcnVpLXZpcC5hdy5hY3RpdmUuY29tL2NsaWNrLzEvMTcwNTAwOTU1NC81ZTNlN2M5ZC1jNTUzLTRkNTEtYmE3Zi04Nzg4MzE1NDlkMTIvNzE3MDFEMjEtREM2RC00MzVDLUFCRDctODc2MDg0QzdBM0UxL1cDc3BjQgpkIVDkNmTsVM_AUhNkamFuaS5zZXJrYUBhYmIuY29tWAQAAAAL
Resource
win10v2004-20230220-en
General
-
Target
https://click.email.active.com/f/a/DgjjM_K44d7kmu-4P8hZHA~~/AAOtGgA~/RgRmGWkeP0SCaHR0cHM6Ly9jb21tdXNlcnVpLXZpcC5hdy5hY3RpdmUuY29tL2NsaWNrLzEvMTcwNTAwOTU1NC81ZTNlN2M5ZC1jNTUzLTRkNTEtYmE3Zi04Nzg4MzE1NDlkMTIvNzE3MDFEMjEtREM2RC00MzVDLUFCRDctODc2MDg0QzdBM0UxL1cDc3BjQgpkIVDkNmTsVM_AUhNkamFuaS5zZXJrYUBhYmIuY29tWAQAAAAL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133258253779812274" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2656 chrome.exe 2656 chrome.exe 1448 chrome.exe 1448 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeCreatePagefilePrivilege 2656 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2656 wrote to memory of 1272 2656 chrome.exe 84 PID 2656 wrote to memory of 1272 2656 chrome.exe 84 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 384 2656 chrome.exe 85 PID 2656 wrote to memory of 2272 2656 chrome.exe 86 PID 2656 wrote to memory of 2272 2656 chrome.exe 86 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87 PID 2656 wrote to memory of 212 2656 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://click.email.active.com/f/a/DgjjM_K44d7kmu-4P8hZHA~~/AAOtGgA~/RgRmGWkeP0SCaHR0cHM6Ly9jb21tdXNlcnVpLXZpcC5hdy5hY3RpdmUuY29tL2NsaWNrLzEvMTcwNTAwOTU1NC81ZTNlN2M5ZC1jNTUzLTRkNTEtYmE3Zi04Nzg4MzE1NDlkMTIvNzE3MDFEMjEtREM2RC00MzVDLUFCRDctODc2MDg0QzdBM0UxL1cDc3BjQgpkIVDkNmTsVM_AUhNkamFuaS5zZXJrYUBhYmIuY29tWAQAAAAL1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae0969758,0x7ffae0969768,0x7ffae09697782⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1812,i,1717116498813666358,16682515908531945786,131072 /prefetch:22⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1812,i,1717116498813666358,16682515908531945786,131072 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1812,i,1717116498813666358,16682515908531945786,131072 /prefetch:82⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1812,i,1717116498813666358,16682515908531945786,131072 /prefetch:12⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1812,i,1717116498813666358,16682515908531945786,131072 /prefetch:12⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4520 --field-trial-handle=1812,i,1717116498813666358,16682515908531945786,131072 /prefetch:12⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1812,i,1717116498813666358,16682515908531945786,131072 /prefetch:82⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3400 --field-trial-handle=1812,i,1717116498813666358,16682515908531945786,131072 /prefetch:82⤵PID:444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4480 --field-trial-handle=1812,i,1717116498813666358,16682515908531945786,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\35a83a3c-e933-441a-b6d0-9818c4a467e7.tmp
Filesize6KB
MD5d40fe90a0b139c3ca1ad4bd5759b0066
SHA1b4944032ffc8dc4b1aad7e0caed3bd3f1ff20084
SHA25612b58a2d302e220b8d9f3099638abbe8bfa34a0591b35e4c46c22808a55efe3c
SHA512180ccdceca7f3a48771ed08074de4012a21605c66bdbee5499c513803713697d0b4c2d81a796a15b0732de546e29c99c4ccbdcb4b27267d4f8d0244edd223aa3
-
Filesize
288B
MD52bfc88d76b29749b13bc3dae5917c682
SHA1f67b5da763afa4a5c6167ea6734f26803efe25ae
SHA2569447577d5d8bfe8cfc9a2c9f0f7fef1e2fd5f432eecb5737050b896e625e0bca
SHA512afdfa1c662f5d6e1806f0634bfd2dab4aeca3510ceb5ecfaaeb476cb3cc2765488292cdc2545bd1d038d647a64d398672a3ca1277c8af284ed4d624bb9ff12be
-
Filesize
2KB
MD5190b15dc100c535d5000f2065d92ba1a
SHA12294cd65d76910ba87da86892531c3ae492837c3
SHA256af513b410d035ea5fc0f0aac689a25e8085189290361f5961060961baddf5c86
SHA512fd9c80dc35d34f478a05fd753190896b6c1698dfa9d5246a9f3588da90e69bb8a95157e9a20f31dabb8204ae2e3a65ae7b6b6172c397247bdbf96859f247ed85
-
Filesize
2KB
MD56b3109defbd4d43d95e273963273e1fc
SHA148c339754d59dc055cb27f18d8b66c024de3a697
SHA256a17a565e9c96b8a691785096fbca945d9f104c3c6a77f228ff7ab7574f47e91f
SHA512f769d2863f7bc11ff81bf624145df7581c2206fa40ece1005e525a7e54a2c26e31d4781db6106536c4c26948621991fbc40db49bcc3728333a72738a2ffa69e3
-
Filesize
539B
MD58ee65bdb8a8a07e5db4d096fd151d998
SHA165b494536b16feed7b142d800c5b37bf7bdfb27b
SHA2568efea42c6eeff1c9a32a015a68456cf4a39e47fdab276a07f422d7db2dc36a3c
SHA512c041498e0ae5277a207fbb35d3bf5d44f16a3583225071d09a46252b2df0e768dd88a3293d15c93059a5586835b7846eec5a429136fc4740d478757215860bd7
-
Filesize
6KB
MD579380726715717ede9fce3c24a02327d
SHA1fe784b777ff89b52da1f084c06b740071dc4f761
SHA256690030d047aa5007ef7514369fe216150407a69d45ff04b0fc1bfa6bbc57d3eb
SHA512eb6291e2a6b0166cfb9bb4a4a2f5c56ff3b1ad226e7682d2c20586239a8c270fdc26ea46c9fdcb8269fc895e9d0f5a0922d4927e82c440bd6f9a5b162c0d0eaf
-
Filesize
6KB
MD5f4ae2d49cb2b76c3c9735d706152adac
SHA12fd46a40357e5ec908d500c113e1746b41109c24
SHA256dc19f610bd044aece31bea58d17d296a52be09bae69b5f777d304efb3c2533d2
SHA5128e2ad1e286f383210ea1cddb24411e5384a639e0211af6834fd59065cbcb039be7db62ed565c03fb661743d0b14c189700c0de65e10d2a9b2301342fd9c44ef2
-
Filesize
199KB
MD53369d46c0b83895ad7cfe06547e1fe18
SHA11f5ed1ba95a725b59c960c7b975d602217e45217
SHA256c5b33521b5470ce6a85bc97aa14d1baf1b8937c458effdfda4735120f22b56d7
SHA5128478da9eee7b38b974ffe2bac08cbfe1a317f7ae3aec02cef2b99ff6ca0cd32698a6bdbbdbe11d73bea47d1893403aa0ea45b14c7de3235f147202a61740aac7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd