Analysis
-
max time kernel
159s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2023 15:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://api.spently.com/api/spently/click?id=105133&store=hotelcollection&type=OI&cid=6272440696998&url=hxxps%3A%2F%2Ftreytrainor.com%2Fxyz%2Faro%2F%3Fuserid%[email protected]
Resource
win10v2004-20230703-en
General
-
Target
https://api.spently.com/api/spently/click?id=105133&store=hotelcollection&type=OI&cid=6272440696998&url=hxxps%3A%2F%2Ftreytrainor.com%2Fxyz%2Faro%2F%3Fuserid%[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133343400643457374" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 4296 chrome.exe 4296 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe Token: SeShutdownPrivilege 636 chrome.exe Token: SeCreatePagefilePrivilege 636 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe 636 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 636 wrote to memory of 2956 636 chrome.exe 28 PID 636 wrote to memory of 2956 636 chrome.exe 28 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4040 636 chrome.exe 88 PID 636 wrote to memory of 4984 636 chrome.exe 89 PID 636 wrote to memory of 4984 636 chrome.exe 89 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90 PID 636 wrote to memory of 4248 636 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://api.spently.com/api/spently/click?id=105133&store=hotelcollection&type=OI&cid=6272440696998&url=hxxps%3A%2F%2Ftreytrainor.com%2Fxyz%2Faro%2F%3Fuserid%[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca5779758,0x7ffca5779768,0x7ffca57797782⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1856,i,10216980937751383134,422840722815364649,131072 /prefetch:22⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1856,i,10216980937751383134,422840722815364649,131072 /prefetch:82⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1856,i,10216980937751383134,422840722815364649,131072 /prefetch:82⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3108 --field-trial-handle=1856,i,10216980937751383134,422840722815364649,131072 /prefetch:12⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1856,i,10216980937751383134,422840722815364649,131072 /prefetch:12⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1856,i,10216980937751383134,422840722815364649,131072 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3984 --field-trial-handle=1856,i,10216980937751383134,422840722815364649,131072 /prefetch:82⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 --field-trial-handle=1856,i,10216980937751383134,422840722815364649,131072 /prefetch:82⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3992 --field-trial-handle=1856,i,10216980937751383134,422840722815364649,131072 /prefetch:82⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2348 --field-trial-handle=1856,i,10216980937751383134,422840722815364649,131072 /prefetch:12⤵PID:3764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2796 --field-trial-handle=1856,i,10216980937751383134,422840722815364649,131072 /prefetch:12⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5092 --field-trial-handle=1856,i,10216980937751383134,422840722815364649,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\18e3d303-9364-42cf-96ee-8c3bad09cd16.tmp
Filesize6KB
MD51529b723d8c24fda2931a7256539c985
SHA1ffd2c10cc105d6c4b54d53a4c68d1e8736afde2b
SHA25604b363472a3b6e865dee856cec8a30dd31fb34dc378ccd50971287daf4e7f3e7
SHA512874cb489cd6125c9b6eba7521554785e4274557f55e42875c929d3d1dd678a216211a035d74e22e4de64f4537ad3b3c9c421c7cebff5c4d7bd821889df70ead3
-
Filesize
1KB
MD59da420cbca7abf1896b45b89fcb1e9e3
SHA106590363013f747312ff85844c35df12ed4720fc
SHA25624642b4cc67ef16672b257b0338acdb56726a823966b9fe4d87f75eba4004cfd
SHA512c2e8e895a93e1f1424d4a36e0a9083dff4400b48fce8306203f416117a562c409b065c1071e706a0c79767fe8e7c1216dac8e043335bba4ffdaac57d2112e32d
-
Filesize
9KB
MD533a3335f2ceab90e63ac6359fa73af9a
SHA1fa8c1b808aed5e60e3d84858c90d9a580f1f12d6
SHA2567bde65f7dd3629a9b010fae07b020372a21d1c00a3f5ed131a945ac338674056
SHA512f85e58997f1ac770f2da9c55a84808eddc3864dd6febe93813cee3dda0c135626ccadf5022363bf07d2279ef89d1fd510283faee538467cb0670d5ddb84a0853
-
Filesize
8KB
MD54f8ed200f0814e9143dda6489c866b03
SHA13ff73dbb6b096506a511e5338ea521993f1afef8
SHA256d59bc8ddd62b8f5aa3d71f80ef8579b8489537f162025acad4d0c76b9f714a6f
SHA5122ef58e06cf6ba390f402c08bff3f896ec9571d4b5b961b9cf91221285b99c526c816df6bd3597e5160fef7e00e2c862a925ce03e46ebd046129a9712fec02442
-
Filesize
6KB
MD5126ddada0b38f03eb641ccddc0cd8314
SHA10c1a7688ec6a63cc23eaf5afc432404dcf6e7b67
SHA25668cb4a859d4e654e63f69a155ed0d4fc02326b70a14032ce96133f1bc2447cbe
SHA512662f7fc04e263e334caaa30ec885e96af40c3571bf466c88ea629ac89bbf61601ede4b6a358ef3727f65c79ae253e19e31e50c555ebd1ed79077b955a81a9b26
-
Filesize
89KB
MD5713658ed06ecb7bf4221d99e4091ef3d
SHA18d1edfee7705b4f42e1a58bca432cdc0a9777244
SHA256670da09aba5dd35bda4428d35cba55d534435b95d4cacc89b657a9a6a650c0d0
SHA512add3e7aadb1b9d8fa1de514fce430f334d84504fb02a02b3a7fdd482154f6f9a4009597fe7af0ae572c217aed75550d87fded86de0715e6a96ccf63f559a72ac
-
Filesize
89KB
MD56f238a9b40a7caa3c20719d3b5c731fe
SHA12883d0259dd66444bfec464d21c5040d6598e11c
SHA256e605c38dbd0f92dc525a573c4aba6a0403d6e6607f6447620991e0b16d24df99
SHA512eae942aa849ececc1f81979c76b0bc20625d87ae1f87c5e7bdb197c0534fccdf507cc27b18511f411f778a895261bd33c0eba9eead25e0ccdb1bb8ec716941fd
-
Filesize
108KB
MD5df323a63f1d20bb9794d15a7687aa013
SHA10c52d07c2862c0b1beb7411de03b91d2c33659da
SHA2567f3f7dee4c79f278650c9df4cf937dd11b85f4c5f12ae1d4cf5efc6874057aaf
SHA512f3607928351f4bb61cefa72966314ec37995424227f65433905991700c04cb72897681fc07751efdedb3be13f8759fa9f2cee4f5de052608d1c4e0d2325016b7
-
Filesize
89KB
MD5b2f063971b97901606f0e79c7429c504
SHA1f604f5ac008deed7083c0b3e663133d7aac373f2
SHA2561603b971f63accc3892f3bef33c20a01d7b2cd44ddd7eb603e8074d7c41d1db8
SHA51295506e0c117e8d0d91ca0521694db41a8184593a81e0bcb5e0b5b13c75eafe6df6635393c04bfdf720669afa656307f157f7046aa101d4fe3baabaf073bdfa58
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd