Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2023, 23:03
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133335902157677792" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4392 chrome.exe 4392 chrome.exe 1336 chrome.exe 1336 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe Token: SeShutdownPrivilege 4392 chrome.exe Token: SeCreatePagefilePrivilege 4392 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe 4392 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4392 wrote to memory of 4584 4392 chrome.exe 33 PID 4392 wrote to memory of 4584 4392 chrome.exe 33 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4460 4392 chrome.exe 88 PID 4392 wrote to memory of 4168 4392 chrome.exe 87 PID 4392 wrote to memory of 4168 4392 chrome.exe 87 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89 PID 4392 wrote to memory of 1936 4392 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://go.microsoft.com/fwlink/?LinkId=5509861⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae3b89758,0x7ffae3b89768,0x7ffae3b897782⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1864 --field-trial-handle=280,i,14615840758066305804,1259676126405217085,131072 /prefetch:82⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=280,i,14615840758066305804,1259676126405217085,131072 /prefetch:22⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=280,i,14615840758066305804,1259676126405217085,131072 /prefetch:82⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=280,i,14615840758066305804,1259676126405217085,131072 /prefetch:12⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3172 --field-trial-handle=280,i,14615840758066305804,1259676126405217085,131072 /prefetch:12⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=280,i,14615840758066305804,1259676126405217085,131072 /prefetch:82⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4912 --field-trial-handle=280,i,14615840758066305804,1259676126405217085,131072 /prefetch:82⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 --field-trial-handle=280,i,14615840758066305804,1259676126405217085,131072 /prefetch:82⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4856 --field-trial-handle=280,i,14615840758066305804,1259676126405217085,131072 /prefetch:12⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5052 --field-trial-handle=280,i,14615840758066305804,1259676126405217085,131072 /prefetch:12⤵PID:528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2588 --field-trial-handle=280,i,14615840758066305804,1259676126405217085,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171KB
MD57a88e1edbba1ad7bd345eb14f1377a59
SHA1b299cf2eacc2d17d1f2fbda9391079b6f05fb022
SHA2563f6aa29738172f431b8e2af2e39cba0c2f91583d7bc23f988c7b7b35975bef2c
SHA51248870540a5e7aedf4513610e23dad5d37ff48dde92909345771f7235d4526893e65d11915b46191e62dbe6e9bed4626215703fc90932bdebed356568c1557f95
-
Filesize
1KB
MD550a2fce354a839f2800ff5c959a3c621
SHA1ba582cfc234742d4202918f761425b85f86be4ae
SHA256044edebc0da477d2f967b7853447a4d708314dca181f6acf2b351a96907d4537
SHA5127410a8f0ffb07e281686cc7a1f97619831c9a971c71458b859b19f04c1271f571624029e036b9aa74b2a12ea5235d1254eba559bc6788f42560c98e4dfc33350
-
Filesize
3KB
MD571e5877eca86ad7ddf48e3a4655e3fa3
SHA1098dc4c3147f174aa9053c3181023e357fd1885b
SHA25676172596ee12fd1747e9de22410ed89babf7cdd6bfb4d564d09bc8db6a8017c4
SHA51213238501935303b6784211096fc8e3be366c82654b6d3a7cb2afb7820cef27bd23d5a321bbc834fdd90376ae64b8e7d039586291a61e0ad561689f0b1cd349df
-
Filesize
2KB
MD5ca71e8b9c7f3518b678e2eb530d7562d
SHA1d29f536728b00aa37ce1c379df47481b6a88efc9
SHA256a85783081b994948b1319e3a77f4387a8e942a8460235b16ecce8f73e621c7af
SHA512b230040aa5dc3985ac80591ac3ca66277ac8a0f07360cdbe304b297622416a130781eca072eb14b302221945b45d50640159cfb33b50e2d367f9fdd2e1706f52
-
Filesize
2KB
MD598f6cecd5c23dab40f7ec7c5b1301b38
SHA19a5411cbada0775321128e574363001138788c74
SHA256d41786947d9b9031009074450c5eff2beffd0c31c76a4fa20d5848557c83e6d3
SHA51272a0afcc07e623f9df292a21687dac4b461d638999b8f7ec855383a8f8c90580d5329806e645a88da157eed36a565bfcb0ff297d01285f9c47f9a824e675fa55
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\d7d314df-fb9e-4e5c-b2b0-b6e36e321ffd.tmp
Filesize1KB
MD564e2212f077d5c99adabae8613582444
SHA193b5bedf4fcd75476d97144190a0f07fb9d264c7
SHA2569246cbd4a2ef438cdf519115bc3df3e82baacaa64a03385d7dcc13a7bb8a5581
SHA5128734eda0d8c58e0a288ee5dd64c706ff867640b8734e0a8b9ece23f207fc09615cd1b1aac693f69b58c36b5738e3aac595d5fbb150dbadf567e3be013254c790
-
Filesize
7KB
MD53f69dd0f0a559fabd5a164a5c31c226c
SHA1129a3b1f41601adeb146e02d2b0c99f24d7d030b
SHA256a16e0a068b55a42bfc0cfa0ecbb6ceb574805ed425d2476fa5e69a7d8945f69e
SHA512bf383adefc35b83db16752721475adb7dfce4f408d2c7ffaed0830777f9f5e5a3dc61f5c87d63cbe3d0003c0081b82fe860009792952b3a1c67a473a783d0f4a
-
Filesize
6KB
MD5e98740df62aeee2213d03461e48a4432
SHA1ac9bbb80c772a9204b6aa88ba5cdb295c5fcb37d
SHA25671afd589d72122abb2ff890f335062459f327db4db5f6cf67e1bd7e572293e17
SHA512702a8da628fd4bfec5235524abbc6499ce7671c9c6f819bc4d67020fc6ce1e1226ac14d7d757760cf42fddf97a1076014e564d107780748fbc84ae028fd38dd7
-
Filesize
15KB
MD56a573617d89628653d12ca588d15c3f6
SHA1a722b659fed717210c6524aeee6e71d931d90269
SHA256edd74da40def17056a8c05408f2036733c02d0cd2cd8dc3cea36c9c018929c57
SHA5129d78666afdd3fc51397f06c760f35802c132b6ec6e5818ac352c1a6d99ae661c5c3d66d7fea5f76dd122b7d3d407868f5341ae101f7e306bc9e365c9d1e04970
-
Filesize
172KB
MD56f2a26ae684b9c02e3ffeb9020d0c806
SHA189c7d66594c49d817b989312e718b92627a7d1b7
SHA256ff629b994a0c426816fb6873f4770eb864e9dd492d2e49a307bb076cb419a12f
SHA512a69a9bce94531f31ac060c4785585ed541d90a905d2e7a6cf70611d3fd86f5c2e0016c2f895042824f9b68283c22981572f2ff8bdb81d3b6ed8f15418453ccc7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd