Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2024 02:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.galienfoundation.org/e3t/Cto/DL+113/cFSnN04/VX8Vcj6YG9gKW4lglhD8N8z80W3wqskQ59B6RsW4zFKvD3CFCrH122
Resource
win10v2004-20231215-en
General
-
Target
https://www.galienfoundation.org/e3t/Cto/DL+113/cFSnN04/VX8Vcj6YG9gKW4lglhD8N8z80W3wqskQ59B6RsW4zFKvD3CFCrH122
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133527832920328146" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3448 chrome.exe 3448 chrome.exe 1908 chrome.exe 1908 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe Token: SeShutdownPrivilege 3448 chrome.exe Token: SeCreatePagefilePrivilege 3448 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe 3448 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3448 wrote to memory of 1844 3448 chrome.exe 83 PID 3448 wrote to memory of 1844 3448 chrome.exe 83 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 3948 3448 chrome.exe 85 PID 3448 wrote to memory of 4400 3448 chrome.exe 86 PID 3448 wrote to memory of 4400 3448 chrome.exe 86 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87 PID 3448 wrote to memory of 2272 3448 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.galienfoundation.org/e3t/Cto/DL+113/cFSnN04/VX8Vcj6YG9gKW4lglhD8N8z80W3wqskQ59B6RsW4zFKvD3CFCrH1221⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0e699758,0x7ffb0e699768,0x7ffb0e6997782⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1896,i,8412443873103846883,13658512901346249991,131072 /prefetch:22⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1896,i,8412443873103846883,13658512901346249991,131072 /prefetch:82⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1896,i,8412443873103846883,13658512901346249991,131072 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3088 --field-trial-handle=1896,i,8412443873103846883,13658512901346249991,131072 /prefetch:12⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1896,i,8412443873103846883,13658512901346249991,131072 /prefetch:12⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3936 --field-trial-handle=1896,i,8412443873103846883,13658512901346249991,131072 /prefetch:82⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1896,i,8412443873103846883,13658512901346249991,131072 /prefetch:82⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=1636 --field-trial-handle=1896,i,8412443873103846883,13658512901346249991,131072 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4948 --field-trial-handle=1896,i,8412443873103846883,13658512901346249991,131072 /prefetch:12⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1044 --field-trial-handle=1896,i,8412443873103846883,13658512901346249991,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
911B
MD5a013624464e15716f370b47a8923966f
SHA166edea4c6159552dda997bf7e866b37af9c410ed
SHA2569d625e24452000f9cf1e8eb32fc790b151d7be82484fa2a5059991e714499a9f
SHA5127024e5a384fc832e13d84ebd81c7c09371520b6cb6640228940f1201e0a71d76a9b0dfe7ac5034ac45601463ea7cd31390ee483ac837049d3d4227fe862c196a
-
Filesize
700B
MD5c8e27eb1dd1d2b469fbf50ac14cb3a6b
SHA14e50bf3da39878f80669aeac8dd932f44aab456d
SHA256bd4fdf976255eacd2a3ddded907fa51b8dec526073e3720116481740b7edb4b1
SHA512fc21e2e32489b988ac6b71d17fd9e362c78b9ce4f2ab886cce0c3fe79d23211ad4d93ba3567c8cdf61a0736ce14d8bedb25737640f1a38dc418adddf38d2169f
-
Filesize
700B
MD54c164205efb42f6139dc35abdd8b5b49
SHA1f687edbcf57b90abd83db51526585fbf623d54dc
SHA256fd0d18eb3574cf05319acb621d569a97bd066090af272e2cdc76d0c84c76f523
SHA512292333fe856fadbe963d619a7cd7a3ddbdbd2a556b546aabf41c04dde3ac1421686f5f66bef0e428f83e3827a9617fad2bcbec9c1f9c0d0af06163f131982b48
-
Filesize
700B
MD58b78cbfdde0c18cf28105a4d7146188a
SHA1afc8d5eb0aa700995d7015893a155eed98d4da3e
SHA25601cdeed5e31cb0d4744e049e86276b691c8f83118494ea1d0961ba284a005240
SHA512eb04b5d8aa3666c864f34a185b676f024a240a2ccf7e1e5be916e293b061303bbfab4a710bd04fde01d833f72be3a31af796b35b68a9d899b4ab4ebc7f1e4259
-
Filesize
700B
MD5872450c6fe33318ae9c0fa1d666859c4
SHA1b57caa38eb9b42969120a0a60e0c2dd27162387d
SHA256d4bd595e84573f495a9fb05d59cb3a3b70553d2270f898ffc25809d9456b0fd8
SHA51294c54c65e1dd02a199d04349cfd84c13236717387acafd83a574a50b9a72ca2431fb6acdf50a5ed93937a61a90b7a07971ea2fe2b0094e0ca016e08a33ce4310
-
Filesize
6KB
MD54aa6224fb5f88f4a91abf6b7ace710b4
SHA1c9d2c2432f230883d0abf07a62c2d93e616d221b
SHA2568f9c70dbd347c9b9d87acaecbc43782d93742881feeda02f27a4be7dd2c65179
SHA512972b61869929e31f1fb1b9b204114bef444b78ae9d7e700a50fa4352f562a8af1dc8c6d82371e9f204e7da58880781587adf0dda290926e5787464663a2beb31
-
Filesize
5KB
MD58f056a3fe180cf0c0be3a123e3283525
SHA1111213e244dc7abff9db966eaf7b8b8186dab05d
SHA256d303886134d2a702022922bc5bbbdb027fa66d9f72c263b319e371548c0a74f2
SHA512e20432f3419af52158ba4be2aac57d7f8b3353308c8f6739303728f94b04e292d1a20a220072f24c73c9b2f956f469228d2406058734680d28d75a92d02e2782
-
Filesize
5KB
MD58ed21afdbf8b8b0cc6b81f87f06699b6
SHA18434c3e23a12aa859877193f158349c8fc198c37
SHA2562747822a217a8a36d9da9054fa35242f077eecec98fd9fbaa1d38641dc94dae5
SHA51237878c725b9101c9c71819e89a748906359abe54113c8a7f0b6560098edc6940c168366b4b0f07ee41046ff0365ee90de37b42c1331de29478ed388ec55fb215
-
Filesize
6KB
MD53eb8ad3f809836735838e751047ee85f
SHA185d37e98a7d85992769d046104e8c120b2cfec04
SHA2560cfbb7f742151ed515a397d9fc4bc55470ae863dc08ba5bf9a6bacd411be52bd
SHA512b552fa1a23d81d490c5510f75c66dcd1edb9788ce533361f21b2e05b6a163c9ed288a599caf7af05ece472cc27c0d485bd6c7d5c01ef7c86640c2e0908121058
-
Filesize
114KB
MD59d220374c1d04a7c1a35af3850335e15
SHA1d0c123f2d4ea2b33051f87a652321516a09d8df9
SHA25649c0bc9d4441fc05623dcb6c7edaf8116ce45bb7ed96e86a15c539c41b4b4a08
SHA51267fc1973642eb4c56a0c32b817bf03643232d3cb212c8558a9305e972c44383903660153609a8d36c0d52f00ba32aa4e4f68cd48e3d04c4764f1286cffb0cef0