Analysis
-
max time kernel
53s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2023 15:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://jimdo-storage.global.ssl.fastly.net/file/cc5d4f52-9d91-44df-9819-a34f0091c46b/wokakab.pdf
Resource
win10v2004-20231023-en
General
-
Target
https://jimdo-storage.global.ssl.fastly.net/file/cc5d4f52-9d91-44df-9819-a34f0091c46b/wokakab.pdf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133447087446129749" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5084 chrome.exe 5084 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe Token: SeShutdownPrivilege 5084 chrome.exe Token: SeCreatePagefilePrivilege 5084 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe 5084 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5084 wrote to memory of 4700 5084 chrome.exe 44 PID 5084 wrote to memory of 4700 5084 chrome.exe 44 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3488 5084 chrome.exe 89 PID 5084 wrote to memory of 3952 5084 chrome.exe 90 PID 5084 wrote to memory of 3952 5084 chrome.exe 90 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91 PID 5084 wrote to memory of 972 5084 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://jimdo-storage.global.ssl.fastly.net/file/cc5d4f52-9d91-44df-9819-a34f0091c46b/wokakab.pdf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5caa9758,0x7fff5caa9768,0x7fff5caa97782⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1900,i,15162994514572830268,17178902345220922691,131072 /prefetch:22⤵PID:3488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1900,i,15162994514572830268,17178902345220922691,131072 /prefetch:82⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1900,i,15162994514572830268,17178902345220922691,131072 /prefetch:82⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1900,i,15162994514572830268,17178902345220922691,131072 /prefetch:12⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1900,i,15162994514572830268,17178902345220922691,131072 /prefetch:12⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4628 --field-trial-handle=1900,i,15162994514572830268,17178902345220922691,131072 /prefetch:12⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5040 --field-trial-handle=1900,i,15162994514572830268,17178902345220922691,131072 /prefetch:12⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 --field-trial-handle=1900,i,15162994514572830268,17178902345220922691,131072 /prefetch:82⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3916 --field-trial-handle=1900,i,15162994514572830268,17178902345220922691,131072 /prefetch:82⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5608 --field-trial-handle=1900,i,15162994514572830268,17178902345220922691,131072 /prefetch:12⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5704 --field-trial-handle=1900,i,15162994514572830268,17178902345220922691,131072 /prefetch:12⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3524 --field-trial-handle=1900,i,15162994514572830268,17178902345220922691,131072 /prefetch:12⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5064 --field-trial-handle=1900,i,15162994514572830268,17178902345220922691,131072 /prefetch:12⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3508 --field-trial-handle=1900,i,15162994514572830268,17178902345220922691,131072 /prefetch:12⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2972 --field-trial-handle=1900,i,15162994514572830268,17178902345220922691,131072 /prefetch:12⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5d14c27af383a487a0d2503ab8afedc79
SHA1c09bc561f2b2e576d500785a3aef832afd7c2cf3
SHA256d20b9a5a7f027c0cb8382c3d95959ffddce1682529fa3374bfa2ed811717e28b
SHA51271d3217c4a165cf571ca8256af0c0ee9c25e3e41567ab42f068f8b8a331714163cbd2e954284c7fd69c1be59c8171fe725853abd4cf1c8898a25439e00bad2d4
-
Filesize
538B
MD591909db32fe074c16042f8cd5ec47640
SHA17f3c85a0b910302595ea9e574a8864ba00879e38
SHA25625ee3aacf887d4435d72dbed80a64444443442265ccf245e7e721c29a36818fe
SHA512d0e0c10c9c0eba519fa53d699c8a0bf33bbe0dc6ace541c3ed8b685904cdf1a4cae8507fd1cc910e12f53eb3372bf7d15a25c2f8522ec80659af91ead10e5a22
-
Filesize
6KB
MD53ce15024a8bbf66c06a8d17b92502260
SHA149a066bf0342b75415ea83cead2532de69937f3d
SHA2569b195d237764bbab91fd5bfd3634f825dbfee971c03b65a91a20ccfe3d31714e
SHA512b65cba2691326777456850d4804247838fbac187a982edd8ecbde9296ddaf7c283c89d622f8be418fa25aef107ef48ff2c48b99fc312f3f91904569fa1f68a3e
-
Filesize
6KB
MD58953763e5e2bf7a6bae7c23ee0d9b8cb
SHA19681d13561a8558dbc2297fd0c0ee79044f758fe
SHA25600402482dc6f3c8e8d823e64b3613d606c0d37df57943d3e271bbe7f21aff981
SHA5123a23073f1123711baf59be47bc682ae87597ca05c43fb1057254aa044d56a2989a70e0a4e5abcb65676ac68ac33214f876d5c97f00cac0c8842d9212493d6916
-
Filesize
6KB
MD5a28427bcf5bfdc392366c4e9687b3d51
SHA1db5e56006aec4ba90dc026b0ded4fd49358df701
SHA2566c27a4d23a82e799b8313b0b494b7ac89d45f2c6b1e37c6c07bdc0cf8b96bba4
SHA51259231640b486b5f754f53e0416b2bfb9ab1228e46659e1b608399a34eb3d864dea76839d473f2312a8ea91540a8379c88f4fad1723096ab5b8404ffc4623b5ae
-
Filesize
109KB
MD50957267e173663a0428a5b80ceb569db
SHA15d06c80fcb4ef76dab92cebf2ca7af5594396eb1
SHA2562e3a1aa05cac7eefe538ae73cdad6b2ca333ff94e05ab2b80141b8657f6a42ef
SHA512449e61e92e6a873c210b79e1ebeec38a517f72aa8e7ef407fd84781d2888af11cb67c741ea45d92e9bb837db30d42fff0c2359a2b718d8d823baef9307df7854
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd