Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 16:27
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pub-4af7427b8e6d4a1a80b8d14249847487.r2.dev/index.html#[email protected]
Resource
win10v2004-20240226-en
General
-
Target
https://pub-4af7427b8e6d4a1a80b8d14249847487.r2.dev/index.html#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133549936794319643" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 344 chrome.exe 344 chrome.exe 5064 chrome.exe 5064 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe Token: SeShutdownPrivilege 344 chrome.exe Token: SeCreatePagefilePrivilege 344 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe 344 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 344 wrote to memory of 4296 344 chrome.exe 87 PID 344 wrote to memory of 4296 344 chrome.exe 87 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 2428 344 chrome.exe 90 PID 344 wrote to memory of 1996 344 chrome.exe 91 PID 344 wrote to memory of 1996 344 chrome.exe 91 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92 PID 344 wrote to memory of 368 344 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pub-4af7427b8e6d4a1a80b8d14249847487.r2.dev/index.html#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc45839758,0x7ffc45839768,0x7ffc458397782⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1824,i,5054440311651716885,1381199947264510478,131072 /prefetch:22⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1824,i,5054440311651716885,1381199947264510478,131072 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1824,i,5054440311651716885,1381199947264510478,131072 /prefetch:82⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1824,i,5054440311651716885,1381199947264510478,131072 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1824,i,5054440311651716885,1381199947264510478,131072 /prefetch:12⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4940 --field-trial-handle=1824,i,5054440311651716885,1381199947264510478,131072 /prefetch:12⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3460 --field-trial-handle=1824,i,5054440311651716885,1381199947264510478,131072 /prefetch:12⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5272 --field-trial-handle=1824,i,5054440311651716885,1381199947264510478,131072 /prefetch:12⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 --field-trial-handle=1824,i,5054440311651716885,1381199947264510478,131072 /prefetch:82⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1824,i,5054440311651716885,1381199947264510478,131072 /prefetch:82⤵PID:4396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3424 --field-trial-handle=1824,i,5054440311651716885,1381199947264510478,131072 /prefetch:12⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4868 --field-trial-handle=1824,i,5054440311651716885,1381199947264510478,131072 /prefetch:12⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5712 --field-trial-handle=1824,i,5054440311651716885,1381199947264510478,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD5cc08e42e8ee8e6beb6fb6241b572d372
SHA15c88020103b0e79ba25e26b56f54055849e73212
SHA256d3eda8a75b846f654e0156692cbfdc4f969786669486b333f2c5f1d7f7b8dfef
SHA512f1e72d80307979ecfad30586f95aede7829e9fc000eed04feac720515b46c5bd1dc617e7987d4353df0acf87ff95e9f561a35853e2da71d086a215f7a594c6af
-
Filesize
2KB
MD583cb401a10e9beea70d6f2ebbf461012
SHA184795690647e9dafe641e793bc03bdcbc2bef90c
SHA25616d90848ba14103fe55f6e136a9a065d1a38aa58a23b908392e3b5f3c9a3d09d
SHA512964864762b4256a5f46a6023707ffb4c49c2c5a219faea68574d1909673c7c28ae327502c82b3650af52ef20f2ec0885b7066f0343d9a410dd5d79d6db9ce3ee
-
Filesize
1KB
MD5a230b83701d6734beb2f1d250e701715
SHA18edcc10bf515df91d878ecd860a21852a9ed4f3b
SHA25698be2de208f0bb051738dab74f681fb1c0f47016f27f804460dbe94a936b931a
SHA5127ec9ebb7302f1e24a306b86478ac3da51abee394829677fff920183da0be1c0fb181bb057d06e20911015fdcaa44bc859fb0713d28dc46150b86dba08382dd81
-
Filesize
703B
MD52afca96e4c76eae6b8889d692927773f
SHA1cb6f8b6e9835d2095bbfaf803cf43eec647f7085
SHA256ae28bc0f7486d13187b5c3f09456f855af775e25e5591a75d0830d01068e8b51
SHA512ab9b4f4da2e9b9b51797a17823c334400c9535718d2b8fc761033672e9909bf294878aef50baca18ede5e65203b42f62f14ad382c48ec56e058aad06e61d4419
-
Filesize
6KB
MD568801d743bee201a35c266392298d280
SHA1f6124aaf70a364a7e36bad2ac2fe89d936ff760c
SHA256205b48bf615e11ef6590e7f8a3aa30190db98f0cd9944fb17f8de04172f000dd
SHA51221963723cee410de4ccf435b523698401b8f521a3fe25712b32fffcbb451275c9a3ed5ca69ba65a68867e1317209d3cad45dff7f49de9bd48cfcce87e2c3b161
-
Filesize
6KB
MD54448ff07eb1a2556911745d146ed3337
SHA1b883379cbe8330feca7d09a6afb7706cacae2330
SHA25682fb3b5ae56be3400ccb2b910432c9e9e0272a5b31d1ca58ec407af31480f00f
SHA51272adb3b43dd7eb6a5600a4212135c6cbb0b1d486d044cd15cc49e2df956ad8fdad1aff01cf642c105f9f6c767af4dd337b5438167f8f9c30d179c605f11dbc38
-
Filesize
128KB
MD5896752374b9334dfd8750988cda5459c
SHA176809f637ce22f0ab42442ba861bf082feb5fdb5
SHA256ecfcabe03e2c7f6ed2c265b3338c2c9c1f98a51856463817053d4db5a774d568
SHA51282c6849253a41edccac9308012591038a069b4bc46c006fbdfd994ca5c7073c516f01e8ef105a5be9800de1f6ebc3a4b770a2816e2f62fd7a05655d0c7202eb8
-
Filesize
105KB
MD5235ff16370a1efec299b9fca132a1332
SHA1faa000bdcfbe4ca3b86a95789ebb0e782ae64056
SHA25649232fea08042ea94b4fd7182f0056e29cd287dca6bc0476857820cf7b34596f
SHA5127920dbb41881d93a0829377b8f3c33c11a129d22fc95663a413d8160886ee9007e280c1b3c27ea49843cea30b817f19cb9738728e133ce585dd31ddaa79c42f8
-
Filesize
104KB
MD5a4bad691878acf4c8ebefe0ca3262dca
SHA18617af4bd6d2085810552b235cb7d8e8fe8add7c
SHA25658664524bae8adcc6b4b49e072f6a3fdae2094e3d2bf345abb7a3f68e47d4b8d
SHA5129fac433cb1ab7747f2b1f72a8cf4b6195698f3d9fc6751ec90f2a4ad5eb131646f116dfd4590921abc7f5d0ca4ba375c7733788e970907d0f98e8dde7c8c61d7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd