Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/07/2023, 23:01
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://6943737210.trendspad.net/Aat/[email protected]
Resource
win10v2004-20230703-en
Behavioral task
behavioral2
Sample
https://6943737210.trendspad.net/Aat/[email protected]
Resource
macos-20220504-en
General
-
Target
https://6943737210.trendspad.net/Aat/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133341085368659019" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 1220 chrome.exe 1220 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe Token: SeShutdownPrivilege 4668 chrome.exe Token: SeCreatePagefilePrivilege 4668 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe 4668 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4668 wrote to memory of 3616 4668 chrome.exe 83 PID 4668 wrote to memory of 3616 4668 chrome.exe 83 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 4512 4668 chrome.exe 87 PID 4668 wrote to memory of 748 4668 chrome.exe 88 PID 4668 wrote to memory of 748 4668 chrome.exe 88 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89 PID 4668 wrote to memory of 972 4668 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://6943737210.trendspad.net/Aat/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa454c9758,0x7ffa454c9768,0x7ffa454c97782⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1900,i,9349198218489195932,16616608331736964190,131072 /prefetch:22⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1900,i,9349198218489195932,16616608331736964190,131072 /prefetch:82⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 --field-trial-handle=1900,i,9349198218489195932,16616608331736964190,131072 /prefetch:82⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1900,i,9349198218489195932,16616608331736964190,131072 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2932 --field-trial-handle=1900,i,9349198218489195932,16616608331736964190,131072 /prefetch:12⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 --field-trial-handle=1900,i,9349198218489195932,16616608331736964190,131072 /prefetch:82⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 --field-trial-handle=1900,i,9349198218489195932,16616608331736964190,131072 /prefetch:82⤵PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5152 --field-trial-handle=1900,i,9349198218489195932,16616608331736964190,131072 /prefetch:12⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 --field-trial-handle=1900,i,9349198218489195932,16616608331736964190,131072 /prefetch:82⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 --field-trial-handle=1900,i,9349198218489195932,16616608331736964190,131072 /prefetch:82⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2556 --field-trial-handle=1900,i,9349198218489195932,16616608331736964190,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5e8e06dfb5fd08f2e4312a36fafb7196d
SHA1590d384e81fdf9a378dee1d8d623476f1eec5d50
SHA2568654a2b7635ff215f208cf39be18c4ee065712eaab67c79f7966cb5d0de58123
SHA512ab74920504aca89363a2e96d07bac2ef1b18ad201f5e9696ac71d82589806e7ac1d1a8ffb1cf2eeda3d31eb922c025ff094165dc29ce4336b7c1115788a97099
-
Filesize
1KB
MD59c9d290f2e59db24ea513ca0713be4be
SHA18619cb66463779cafe749d01c812cfd482dae8c7
SHA256ce166f9387bfb19d8e45e084d40307c74c46ce87fb3c317b94d4410dec294989
SHA512915cef66c6f1c5752d6e026eca13df1664015ae2d1223eeaa8a0f7c633c9116356476c47dd5ba43995c09b34df9c5464e9538a096bfe7cd2e5e4ebbbd5b015ca
-
Filesize
2KB
MD5daca00750eeca8b4549f3093ebd6ddba
SHA1cf0070a708fd9794d0dcececfb4b1c1a7a21f5e5
SHA256b6c085415b3ba3b3afd9031e004c76f12be547957041d9e632dac1252f3fe3e8
SHA512843ba7ed688e5a42d5268a8e44f194add9c96c53256afb664ea0c0441f559ff6ba2953ec826897e5b01ac6bd8ea9ebbf1c02c6052462271446557b81ba24a9c4
-
Filesize
1KB
MD536bbcb76306e76d3ae5b13b3507bcf6a
SHA15701108f716c441907d505eeb212604c7eb0873e
SHA256be72635b3d312608f5438185ff33152bf2de51a82750f419872aee16d075c8f1
SHA5126886742705229f2adaef381ba9283c8df1aaa8043da0353b40dc65951aeb401bfaaa4a112ebc52870cf58aaf08899bee9413950186fdbe0d45e5ad9cfa16633a
-
Filesize
6KB
MD5f789d4a1d523155218d9545acc5c222f
SHA11eddd9bd24f262482c55d10f5bbc11e0a3a1a425
SHA2560cc0ca01d00225dc766308b6e1338cb7277d50441e5cfb827af350e634812857
SHA51264c429f09befb9d15aa4b3239168d22a5cd9eadead0dbb2a0cc074b5796d8ec94894288c5db6d521111d4b55b1470f5e08f44f151c116139864dfba384fc42dc
-
Filesize
6KB
MD5695bc8d59d7505f3a97a866e298017f7
SHA13c764c90390915ad9a4b4e21e3ff828a389bd011
SHA2566985b0d6b7e878c30cf872a340d59c36e4a63ca0e1af0046e03b552de53cc033
SHA512f6cccf08387b961f7d3e011f5a3b1893bf156e0d7ec95aa15bd585620c26134db9acf84763b978c43104a2f3cf78e4560fc6d75f7337a189532ad97ec5d09790
-
Filesize
89KB
MD584434c0769436dc82e8c62a694ff2542
SHA17dd3d7803b86e388004c901dcefa82b4e40da6ee
SHA256070925c13d81d82bd94940d63888fad31d56883d7a825f56d2c969f36b54f608
SHA5127a185bccb69d6c55961f00961eab4a680440365ae138c51f85fdec9820522dac4e298c7c4437051491710a54ef8cde796b765c67a0874bbde41f17267179e1ad
-
Filesize
108KB
MD58614c4d05e6e8875f7666e8c8e128bcf
SHA1cb13762bdce6d73cf00e8d955d4ea9948a3addad
SHA25607e358513d54254de003016c8d75a3489ad70e4edee1756922aaa4dd6b7eecfd
SHA512765cf5db0a5d08b540680ed77b7e2ef593e818034ea5ab1e42b250d8f27934f5463632e704c4ecbe9e00a35820ff357751e417dfd72fb76b61789842d7dd947b
-
Filesize
89KB
MD5ecdea2f2de085695414955a3eff5d8ee
SHA1fb93f63ac7f6becc9be036e05c6d413a3847cd5a
SHA2564d65158300be2275fac4e755f899b4466f347fdc2cffe41d9d06640027eab819
SHA512923a99ae6445c18799e5de568d9dc6893213e54af1ceb52db7ce0513b2d3c2ab078037627e8c692344d0f6aa9fa12da82aef8afed07f7d4bb773116e9e795fa8
-
Filesize
89KB
MD528953967e950dd9f71a00965610cda57
SHA177c1d659eba03441881b79915a14a02746775cec
SHA256f879c5f390500abf7f575caac7538d386b921860cdadb41eecf52ef26e74e022
SHA51257cb3700a7a1a52988aeac2bb3464259bf8e38ef30f133208162d10945c3ee88f420708fad0dbb7a28f51e3b5c6bfe43aca7dd73655c7bb63bb190e317c4ec85
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd