Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
294s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2023, 12:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://protect-us.mimecast.com/s/xK96CBB7YEfDwGgDXtWaKhn?domain=md511.org
Resource
win10v2004-20230220-en
General
-
Target
https://protect-us.mimecast.com/s/xK96CBB7YEfDwGgDXtWaKhn?domain=md511.org
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133263026578306957" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 384 chrome.exe 384 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4964 wrote to memory of 4020 4964 chrome.exe 82 PID 4964 wrote to memory of 4020 4964 chrome.exe 82 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 3480 4964 chrome.exe 85 PID 4964 wrote to memory of 1464 4964 chrome.exe 86 PID 4964 wrote to memory of 1464 4964 chrome.exe 86 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87 PID 4964 wrote to memory of 2768 4964 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://protect-us.mimecast.com/s/xK96CBB7YEfDwGgDXtWaKhn?domain=md511.org1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff931869758,0x7ff931869768,0x7ff9318697782⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1832,i,6300624846085617513,15062389498657678194,131072 /prefetch:22⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1832,i,6300624846085617513,15062389498657678194,131072 /prefetch:82⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1832,i,6300624846085617513,15062389498657678194,131072 /prefetch:82⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1832,i,6300624846085617513,15062389498657678194,131072 /prefetch:12⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1832,i,6300624846085617513,15062389498657678194,131072 /prefetch:12⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 --field-trial-handle=1832,i,6300624846085617513,15062389498657678194,131072 /prefetch:82⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4764 --field-trial-handle=1832,i,6300624846085617513,15062389498657678194,131072 /prefetch:82⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 --field-trial-handle=1832,i,6300624846085617513,15062389498657678194,131072 /prefetch:82⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=1780 --field-trial-handle=1832,i,6300624846085617513,15062389498657678194,131072 /prefetch:12⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3184 --field-trial-handle=1832,i,6300624846085617513,15062389498657678194,131072 /prefetch:12⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4656 --field-trial-handle=1832,i,6300624846085617513,15062389498657678194,131072 /prefetch:12⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4412 --field-trial-handle=1832,i,6300624846085617513,15062389498657678194,131072 /prefetch:12⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4996 --field-trial-handle=1832,i,6300624846085617513,15062389498657678194,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4632 --field-trial-handle=1832,i,6300624846085617513,15062389498657678194,131072 /prefetch:12⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2052
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882B
MD5b7eec8bf143bc03e0dec28451ddb84ec
SHA17d398116dd216f224a2cff26f7a14c12e733ef90
SHA2561b858f96989345f54a6af0cc4dc8bac3008f6bcb0ae440fd671579dcf9a56f2b
SHA512b6c4b986fbcfec1e69e23637e3b9551e8c7903aca95fca98a8f1bfac64cbf732b3398332b264801172748529ec390bd241b98ed684c8f9383b52f9fb75e77ff2
-
Filesize
538B
MD556ff3c48be7a7d8da29505373f937d3e
SHA16a52f6dc4e47c5976f1064c739b4f0bc01ec0eb4
SHA256d1b4b395af9f6d274129f67a13811e617218b80f3f1b8f2c59bebbd1194edde9
SHA512618f4fdba31c26e6bfdadcf04640454d76dceba84bb49689b18529b1d7f56645d93ba293c708fae90243f62e7baaebb36ae63d747d042f213f8ab81287d7525c
-
Filesize
6KB
MD52673338b57d97d902e65c3fe63fd5241
SHA1e6db3b18c9b8a971288b20f15ee1c41ff84c4c2a
SHA2566f4a438f9db30578341436c82385a9ec1a8ab70c8f9cec32896b26fd3fc64457
SHA5128121fd10059e6702042beba65c4639539942038acb7308c0fad3cf865b94b83723fcbb4d413151bd0e16c9e4ca000aa929dcafdc3bcafbe5c41fe54e40419a66
-
Filesize
6KB
MD5adfa8132fcb6396531f11abcfd872a0b
SHA11c4e8b7a605d63ac1227cec640a726971d5c36cd
SHA2564010c27718b66f152796daa6605f868fd2492f9f21910ae44ad109cde0ec2105
SHA512fce773f1c7edea2a2b518e392c34e9e95aa00dd10d00b9c8b4de6e6b9af9a867267aef29090a607f60f76fd3f66b6e578a301ca45921158f165c61b2630c4ff6
-
Filesize
15KB
MD54fb62590fb943eaf9607e0cef17d4afe
SHA1f18f1c160f131981ace09df554b9fe45addbd11e
SHA25659ecec8cdd41e69da5072160bdacdd861e54ab0bce09a4c8b5786bb15bfd16de
SHA512b124a68d80db4d30ac5756c632b6f2bdeb34aec49643c8a546d59ce8032be6f2f7b4c5ad59483667f66b4590b1a3dce1e1c5c75f44663127794c0b6fadd16200
-
Filesize
199KB
MD59edc4a21cadb41074bace2d7645c6cf5
SHA12e5fba257477cc1fe91a226519efd33ed8903a28
SHA2560d7eda2d046bb12c13b5d25d41aec8cf771336f8f346c0f13fe2342f36873331
SHA512bdebb37a7d5597131818a01ee05be56ca731ac756394476ea5b92f943923143f4624161b645271c285192023c17a38c238a8c4549614c70435162193013ddf88
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd