Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
29/01/2024, 10:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://trc.taboola.com/p3p.xml
Resource
win10-20231215-en
General
-
Target
http://trc.taboola.com/p3p.xml
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133509961017174346" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3656 chrome.exe 3656 chrome.exe 4240 chrome.exe 4240 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe Token: SeShutdownPrivilege 3656 chrome.exe Token: SeCreatePagefilePrivilege 3656 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe 3656 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3656 wrote to memory of 96 3656 chrome.exe 73 PID 3656 wrote to memory of 96 3656 chrome.exe 73 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4672 3656 chrome.exe 75 PID 3656 wrote to memory of 4328 3656 chrome.exe 79 PID 3656 wrote to memory of 4328 3656 chrome.exe 79 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76 PID 3656 wrote to memory of 2284 3656 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://trc.taboola.com/p3p.xml1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd853f9758,0x7ffd853f9768,0x7ffd853f97782⤵PID:96
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1580 --field-trial-handle=1760,i,13842159138186997517,568100121791755359,131072 /prefetch:22⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2060 --field-trial-handle=1760,i,13842159138186997517,568100121791755359,131072 /prefetch:82⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2676 --field-trial-handle=1760,i,13842159138186997517,568100121791755359,131072 /prefetch:12⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2672 --field-trial-handle=1760,i,13842159138186997517,568100121791755359,131072 /prefetch:12⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 --field-trial-handle=1760,i,13842159138186997517,568100121791755359,131072 /prefetch:82⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4208 --field-trial-handle=1760,i,13842159138186997517,568100121791755359,131072 /prefetch:82⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4292 --field-trial-handle=1760,i,13842159138186997517,568100121791755359,131072 /prefetch:82⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4408 --field-trial-handle=1760,i,13842159138186997517,568100121791755359,131072 /prefetch:12⤵PID:524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5212 --field-trial-handle=1760,i,13842159138186997517,568100121791755359,131072 /prefetch:82⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3252 --field-trial-handle=1760,i,13842159138186997517,568100121791755359,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4240
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4588
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3bc1⤵PID:4256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD5f896128d7e4c93276fa8d37353344140
SHA1e1d9889b5afbae2b3680c0e1a84ee87f0baeff38
SHA256a9f4cd4a7370d303be3f50aee413004bbfb8c3f7d9007bd05afde11ee212d19a
SHA5125a77fb0e654efb963831ffc95dc410401e3291a183c18ad4eca11f99a3702a014e5876482172f69abbe7aae08615e840501c0f4f0f1374544fe189ed2af8ab33
-
Filesize
1KB
MD5202e791fa5337e8acd51e6e2b5d28dfd
SHA1c52df8786e2d166060006899d3d0cb9055555147
SHA25661d0c7a3abd2dc926f08c757b6704618d8c9efaf0c0f64e0c04090930083db0e
SHA512e519466ddbbf291aedb7a9f82bd53628606276b0844bfa4c91c90d6471eae95c3be5ed076af858baaca9c429c2e4aa63fa74c63de5023359394848076935bc26
-
Filesize
3KB
MD58a04d781800e75bd05188f5f472f19ac
SHA18970c5bb73db0661dee7f85baf52ae869aaf86b1
SHA2569dbbc5319f3fd907401792ed065fc2beb8dc595139c3eb9e0f2ddd004cc53cc7
SHA5129f7492412257f5bbb750c3f7ec3b478b2a770cf168d4fd658375c74e778e08edd130da5fbfb50dcdf269a97c30083b807ed9e90ecd913e67759e953c2e9e1151
-
Filesize
1KB
MD52267bdd0c36af3a59b9bfad50cdf20d5
SHA151071fe6f0e07b2496c46392565e5ddd62e1db4a
SHA256cfc1da9158bd248e7c576b013c0ca82c59b4e9c39b5dc57e59e8ae1388efae38
SHA512d64423d2d8f4231eb9f8bec2957ba729a635a34abd424f3ae0cd98f5b2d34613a45bb2d80d2cd0149f56cdd5dbfbd961269c41515a1841ec1ec43765b74bd67e
-
Filesize
1KB
MD57ba81670a1db5a61c30844611c56396e
SHA1c70f8f3bed6ab5847e8d52bc15e7055b3ba0b6c8
SHA25609280669c321d72f034991ffa573085447da5d38d6babc1557cc4bdb3ca6bffe
SHA512a2d9d9c34d57fc2bd72cd0f40bf7b0a7940e39b72f1cf0308d4c700ba6554a01fe35aad72498263563ca89eef275de28f2646cbb2241868b601ccbd6798320f0
-
Filesize
1KB
MD59aa2993e7314655e5fc2f5230daecf78
SHA1c89f4c2aebeebf3f1cb6f180bd7f2fe42966beff
SHA25606c105374610bd5449e3b7cc1716bef60ae2e6be7e9136579b76d68b73d59121
SHA5123f34192e048204705facefc7857057415ef0702ce3cdc1ae8196e47070488c641d407536eb5050c26ebc648e23c2f94d90b3dc80f075136aeb691d3af88afe87
-
Filesize
6KB
MD52eb3af9568f58229a444a57d844775d7
SHA17f1d6464eaf9ad951be9b795a0dd4f6f42f5fa97
SHA256a4f0765252a59c414eecd4490a9967ac3e7ab6c76243aae7ec75a2a4955001d8
SHA5129218bbda81955ff164baea3d5ee5b5ac98c05355ebf81fd3ba01c9ad7dc939ff5161f7d0e6f66160b1d479d57e90d52a8f08604901fa5075084ae7e84e80a80c
-
Filesize
6KB
MD51c96a8fbaa3061d46079d2c5212cdb41
SHA14919693c809bf424f1d8c095e595656f54441e2f
SHA25671df81b5ae31d661b60baec10f9e98e0d09ac8b25385e69ce84dde5a0174e4fe
SHA51245d44c641c1453537926117ff2b1ec0c433f790860ab453561c6236ccdb2a13a1df7b09a0ac1c229561d06657f5bb706ba7cc33703bbb5246fdd799585462f1f
-
Filesize
6KB
MD5d56be8aefa315b965cccf8e6f767dc26
SHA121c178f80d88d7e589e9c56cbbafb418a8bad70e
SHA25612c09be8a3f4f308a81cdc4df6a2e16169f94d2e37c5c6e5a65d266f0117d691
SHA512f41966aeb3c45a3da8545aba1a9da313876f5425243e3f338de4b23112dccf1df90afafd090276e3286963d4882a129f07543334f9b2cefdead568f325aefd88
-
Filesize
6KB
MD5a9584c56accaccd41e8594ada2922d2b
SHA1e88969156fcbe77638d75f716175e9dbfa6fa5dd
SHA25604ae78d9cbd46462a072acbb3389ca06cdd1700b08193d1fb56e6dc7eaf88554
SHA512343fea52180823ccd984e5b3d16e56cd9a640bfee16714245c0fa67b97414932a5662ed783eb692622277f16ce10993b9b0b6c875a78e771c4e0cb0868a69b83
-
Filesize
114KB
MD51738f41d263021e2e126969927a466a8
SHA18bc0d0e14db6aed8fa50251492f426eed6d3e2f3
SHA2567bc2f911f66f628a8f58c04d9e129e74d6a8ce9fe3a33e9812e4f50fd807ef21
SHA512139024d467069700805105d35594c53328c49a928079f0257b7b867ecb0554ed5255e1347b2dcd39afec4b48a8bc787dc09c63ebf1ca0fafa42b34967d245d1b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd