Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2023, 15:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://e.mail.mlblists.com/click?EYXBhc3RyYW5hQG5vcnRod2VsbC5lZHU/CeyJtaWQiOiIxNjg5MTAyNDY5ODI3YTczNmU4NjdjY2Q3IiwiY3QiOiJtbGItNzIxOWQ3MzBmODk2M2UyYzRlMTRjZGZjZjhkMjNiMDEtMSIsInJkIjoibm9ydGh3ZWxsLmVkdSJ9/HWkhfTUxCTE5FV19OTkJBTTA3MTEyMDIzYzk1NDMwM2IxLG1sMTMsaHR0cHM6Ly9wcmVmZXJlbmNlcy5tYWlsLm1sYmFtbGlzdHMuY29tL3Vuc3Vic2NyaWJl/qP2VuY2J1PVlYQmhjM1J5WVc1aFFHNXZjblJvZDJWc2JDNWxaSFU9JTBBJmNpZD1iV3hpWDJsdWMybGtaWEk9JTBBJnRzPTIwMjMtMDctMTFUMTk6MDc6NDlaJmM9OTU0MzAyJnM9eCZxPTEmcGFydG5lcklkPTIwMjMwNzExLTk1NDMwMi1NTEI/sbhc2e3832a
Resource
win10v2004-20230703-en
General
-
Target
https://e.mail.mlblists.com/click?EYXBhc3RyYW5hQG5vcnRod2VsbC5lZHU/CeyJtaWQiOiIxNjg5MTAyNDY5ODI3YTczNmU4NjdjY2Q3IiwiY3QiOiJtbGItNzIxOWQ3MzBmODk2M2UyYzRlMTRjZGZjZjhkMjNiMDEtMSIsInJkIjoibm9ydGh3ZWxsLmVkdSJ9/HWkhfTUxCTE5FV19OTkJBTTA3MTEyMDIzYzk1NDMwM2IxLG1sMTMsaHR0cHM6Ly9wcmVmZXJlbmNlcy5tYWlsLm1sYmFtbGlzdHMuY29tL3Vuc3Vic2NyaWJl/qP2VuY2J1PVlYQmhjM1J5WVc1aFFHNXZjblJvZDJWc2JDNWxaSFU9JTBBJmNpZD1iV3hpWDJsdWMybGtaWEk9JTBBJnRzPTIwMjMtMDctMTFUMTk6MDc6NDlaJmM9OTU0MzAyJnM9eCZxPTEmcGFydG5lcklkPTIwMjMwNzExLTk1NDMwMi1NTEI/sbhc2e3832a
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133336499803916096" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1260 chrome.exe 1260 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe Token: SeShutdownPrivilege 1260 chrome.exe Token: SeCreatePagefilePrivilege 1260 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe 1260 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1260 wrote to memory of 844 1260 chrome.exe 77 PID 1260 wrote to memory of 844 1260 chrome.exe 77 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 3732 1260 chrome.exe 87 PID 1260 wrote to memory of 4668 1260 chrome.exe 89 PID 1260 wrote to memory of 4668 1260 chrome.exe 89 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88 PID 1260 wrote to memory of 3492 1260 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://e.mail.mlblists.com/click?EYXBhc3RyYW5hQG5vcnRod2VsbC5lZHU/CeyJtaWQiOiIxNjg5MTAyNDY5ODI3YTczNmU4NjdjY2Q3IiwiY3QiOiJtbGItNzIxOWQ3MzBmODk2M2UyYzRlMTRjZGZjZjhkMjNiMDEtMSIsInJkIjoibm9ydGh3ZWxsLmVkdSJ9/HWkhfTUxCTE5FV19OTkJBTTA3MTEyMDIzYzk1NDMwM2IxLG1sMTMsaHR0cHM6Ly9wcmVmZXJlbmNlcy5tYWlsLm1sYmFtbGlzdHMuY29tL3Vuc3Vic2NyaWJl/qP2VuY2J1PVlYQmhjM1J5WVc1aFFHNXZjblJvZDJWc2JDNWxaSFU9JTBBJmNpZD1iV3hpWDJsdWMybGtaWEk9JTBBJnRzPTIwMjMtMDctMTFUMTk6MDc6NDlaJmM9OTU0MzAyJnM9eCZxPTEmcGFydG5lcklkPTIwMjMwNzExLTk1NDMwMi1NTEI/sbhc2e3832a1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff9a0a9758,0x7fff9a0a9768,0x7fff9a0a97782⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1908,i,17187863477183288170,17074150891828051291,131072 /prefetch:22⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1908,i,17187863477183288170,17074150891828051291,131072 /prefetch:82⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1908,i,17187863477183288170,17074150891828051291,131072 /prefetch:82⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3108 --field-trial-handle=1908,i,17187863477183288170,17074150891828051291,131072 /prefetch:12⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1908,i,17187863477183288170,17074150891828051291,131072 /prefetch:12⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4552 --field-trial-handle=1908,i,17187863477183288170,17074150891828051291,131072 /prefetch:12⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 --field-trial-handle=1908,i,17187863477183288170,17074150891828051291,131072 /prefetch:82⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5288 --field-trial-handle=1908,i,17187863477183288170,17074150891828051291,131072 /prefetch:82⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 --field-trial-handle=1908,i,17187863477183288170,17074150891828051291,131072 /prefetch:82⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD516fa53fd88f163b4d124cb20aeb69aa2
SHA1d0dbad0f1ab1a5c638d41c695a3e58fa3da2a0c5
SHA256b9438f86b7330ae8abdd9e3a7a91514831048b3034e277f5e34ff92e2c0dcdd9
SHA512e75edc61da0329d3fdd7c68c7432b69890fe2e83a7340729f0234af4801edc466676d8ffbd4d2f723ae5b1c98392b0994f0c05ac3dda7f59777a53965aff5322
-
Filesize
539B
MD5154b0d21c878e994aef87e0ab8373e36
SHA1ea089ecdb7fa0cbd4946ccd063f4d81f45178234
SHA25636ee36b74b88073ab3d82765fecfb76338c585de79edd5292c4853cb1603d416
SHA5129ec16f573b485555dd4f4f0ccdb1f8da285820967a8084d01664b071481f19019e5c2107a8a0b65ebbe4a3b9301222a1bdec3f42b29fd8e30617432e554a7b61
-
Filesize
6KB
MD50bf2818ec6066758765312fc7d56a677
SHA1b80ca114572719604fd7d3f94adf3301656ed57f
SHA25626a0612ec928317f59e18f5206c798ca7692d821dbabae12b18e357fde446dc5
SHA51255895bab3a51364d8eaab28cf61ca283d5eaf2731d93489ef01925a76133b829a260182345416deb1896b1cab8d459b17f133affff68f2f2f552e129d189aa39
-
Filesize
6KB
MD5b285d03772948e92973f11ab30906341
SHA12d32582e0aefcff23a0658e25e69e4fe030aa5b2
SHA2568c02ccc8bf81286e6781b8b83d1a348f0f033e6cba87ff349e6e51c386ddd421
SHA512c507a7ff77a40e57c8ba58e3b049a66db518444ac07f26787a38e72c97b12db2e01be8ffac471272268baeb4d5d9a3f2a8a7d50c9a6aa35e58adc1eb976390fc
-
Filesize
15KB
MD5c162860e143ed3862a051e82c301b1f2
SHA17c295cf62004c28885e2faf958121c5974b4c5a0
SHA2561f1d72f644e85aa5a9468c6fbe910e6aec1fdd2956378d1d48b53b70de9bcd34
SHA51291138a43dbe024f9402467aa1a7de48947938a65a7a0ed2fa1a03221d89b1735e16a0b742364c192c4af82a722766e74c5dea96b7914cad0e5038b59c50e6bba
-
Filesize
173KB
MD5d6b2e643ca239850761112966c2b75ba
SHA15268083e5c059c21a680adf3c99dbbb03cb45441
SHA256d2f566dc3bb12cce76f79e0ad77fb5b36d6eead4431ba7817c1abf8ef48f9374
SHA51238c0ad4dff9244d2264ed76275786d300f3fe17f2f033f13e87f67092959992d253e29cf5c1c2afd1fb0a0bee7cbe97cb89795ef5d57a6659ce2368f3459f989
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd