Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
19/09/2023, 11:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.facebook.com/help/213481848684090/
Resource
win10-20230915-en
General
-
Target
https://www.facebook.com/help/213481848684090/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133395965458866150" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4716 chrome.exe 4716 chrome.exe 4860 chrome.exe 4860 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe Token: SeShutdownPrivilege 4716 chrome.exe Token: SeCreatePagefilePrivilege 4716 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe 4716 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 4364 4716 chrome.exe 70 PID 4716 wrote to memory of 4364 4716 chrome.exe 70 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 380 4716 chrome.exe 74 PID 4716 wrote to memory of 448 4716 chrome.exe 72 PID 4716 wrote to memory of 448 4716 chrome.exe 72 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73 PID 4716 wrote to memory of 2060 4716 chrome.exe 73
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.facebook.com/help/213481848684090/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd5da29758,0x7ffd5da29768,0x7ffd5da297782⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1844 --field-trial-handle=1764,i,7057972488903173637,5515671431204090945,131072 /prefetch:82⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1764,i,7057972488903173637,5515671431204090945,131072 /prefetch:82⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1528 --field-trial-handle=1764,i,7057972488903173637,5515671431204090945,131072 /prefetch:22⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1764,i,7057972488903173637,5515671431204090945,131072 /prefetch:12⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2924 --field-trial-handle=1764,i,7057972488903173637,5515671431204090945,131072 /prefetch:12⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4384 --field-trial-handle=1764,i,7057972488903173637,5515671431204090945,131072 /prefetch:12⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3176 --field-trial-handle=1764,i,7057972488903173637,5515671431204090945,131072 /prefetch:82⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 --field-trial-handle=1764,i,7057972488903173637,5515671431204090945,131072 /prefetch:82⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=864 --field-trial-handle=1764,i,7057972488903173637,5515671431204090945,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576B
MD54d426b3bba36c682205e4d1305cc9fdf
SHA1c9add3122ea718a5bed619fee9ebb8ea62752e2d
SHA256d26b8f65c63390f9f7fb81f3ecc46b5ca962c1f7bcba200b8722ee94387c4476
SHA5129c6782e3f7a7d504ba294a45f7698fbf5ca0897296902e85b8be7764999f4e3a99d437d57d2189d6a1233c9347030cc927ac07dd059e08ec8dabb7574e0a025a
-
Filesize
2KB
MD5d91bf204e7b9f55a82ab86818466cfc0
SHA157a1045ca202e483cc69d3ee575ce8702f552b17
SHA25626fbbbde044db9fa816be6df62b8c99cc3afab113fc8ad3e13deb09cb2088ea8
SHA5126566dfa19ee36e3eb1fdfac22996269436345c38d59692df9ab4b8d571ebb6a40b65c27cd6ad5cc2c7e5f98a13eb373fe53a8e14c9dee420a29a504d9517e0c9
-
Filesize
2KB
MD57415d2035d34aec992d94fff19c9b5d7
SHA1f6067e46c8887e6bc6197155d6688dbf4a7333e8
SHA25699b7eaa21646401ccbe979301d9fbf337054261f31609cff36d1bf5f65c804bf
SHA512338d5f223de5c9e0393a529ec235028b588a4074c4db2ee4bf26750c7991e6f266ce3a7ad6bbe1b732373baee743b2345cfa4fe42fa2955d532330cf6beccd42
-
Filesize
539B
MD50d51ccbc898b8f2664a3c1f5f9818092
SHA1f7b9016ff58dc3e2364c9f01b57e97775b8f2f38
SHA2565100918f70b70ef68f49eda739462713c06f2367d2fbab00f1ac102574cf31e7
SHA512b7159ac8b98eed2bd32d31cbca90ff23b348f9e6fab7daf69ea4e4c5de0f898e0c0335b679f567e65a012acd48d93b6a1539e5f97d3f352d10b60c5eae676c4a
-
Filesize
539B
MD57af49ed9522c13d9233fef4f54426ee1
SHA14a26ebaa480ca888b658d4f382143a318953021e
SHA256fee2f58edd924f9121ab304ac25af817cbd1cd79c033c2d0fddf36fbcc637a36
SHA512610c472e8000a026f836d719631fbbdc7fc78f46407424eb5cbc7256df69157b530e65555914ba711817563a68d61df529c46ef2c09c6d64e35c17d52a5950eb
-
Filesize
539B
MD5ce14f74857a758479082e2dfd26d2c3b
SHA18eb58c2f78d766c14e9e2589a6950e6f3b01e16c
SHA2565e3c8176730bb9634d35cc196fe3af0eac0c1cb1d14296a8fc4188050154debc
SHA512782c570c53994d74e5119c24372ef30c970904afae3755a2fe285d48a8db71a7aae3c68d1b7d7acc0efca38e9c2fb071146e8920c4bdb731d164e285e08c717a
-
Filesize
539B
MD5a36d8117041df5ae0b73f7eaa5c539b7
SHA1aa198751c91152a0271b43250489700e51a94f66
SHA256457358693078652e22382aa90cad25d6ab08a5b74cb5878cdf522e79aad8844e
SHA512683afef6cfd2ab1dd48ee93c06f421143f75961e1c1eef145ed9b1ec50264ff5cb9db2fa0d56a384123df214430c2811f695b472f6f9958f3873b1a9c660d55b
-
Filesize
539B
MD5d74b9f013a04d8a128b8d6ce2db76b58
SHA1391c94a92019273ab2ad7666943cb5e5ed8757d4
SHA25600bfce42522bbed3797c409123f24fec3cd989d1298ca82939c08165c3266eb2
SHA512006e741ff4a05d252a8ed17a1082d904c26037c2a7323bed5dd8a0f35859e92183319a0b7d8dd96bed704bdfd07bf2e024cea07352161ee547591c250045cd14
-
Filesize
6KB
MD5e0ba703c5c9f802448cfdc26e6fdeb68
SHA1e732d152793140321b12ee1075648c525cf0797c
SHA256e3e5b9e9625423287d9b7422bcf22a5ac7083762e421784b8d3dc7a2f85e1813
SHA51296319ca34b7891ee4c4f1337757cdb09a0558c8d65c6910644da2561e09c6568ec3d6664b676014fced5224556ec8e63b0c323c0b58a7f9195ea737f963c898b
-
Filesize
6KB
MD5ec4274e7936cacf9c251cd4a3fa4ddda
SHA18e55fba446dd8dfac8ebe8214383ef94b80df790
SHA256adcd097f80c96a1dd6c382d282edda6e0ce673a609373ce0e8487f3973ecfa48
SHA51237614a76c9ae377eadeb969c8e59f2ed502f49dfbd796cd59ef9fd849d730f7499bae24b921d3878382bff9ed578cb55cec121b638e7a346a8fbe47190baf708
-
Filesize
6KB
MD50cd9b3da192ecf5911b30a8ee50c1467
SHA194030841a47c2f85250ed6e13e62379a261a8070
SHA2562143054da93f67c5d18a1b0729a8625ea445e8402230183b46fddea03fdd7c1b
SHA5128a225e56a9969426af07f3609943a59087d60436815c0a2f9dac1b4691d1cb00befe0c6f0c84c2c067151076ae4d4983ce3d9fae80c1fe790f9d90543918876e
-
Filesize
102KB
MD549896c238ee17ac2eca75b68363c5a3c
SHA16295cab149870000989701b0d6c0fd5b4bd1b50a
SHA256cafc58a18c4d41d677b9934d0b9da1d83ced9f4d6007a50e7ed25e55faa8257e
SHA51253dbcb6111d8115db7970bf552ff06556d185cb2fb332b0ced2a58f02ab1b31a4803b370c2fd2289e2d842dbcda76e16b69a3c14f6ca798f2adeaacf42e9cdb0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd