Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1802s -
max time network
1800s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 08:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.harpercollinsbookpublishing.com/
Resource
win10v2004-20240226-en
General
-
Target
https://www.harpercollinsbookpublishing.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133572980180831730" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2924 chrome.exe 2924 chrome.exe 1356 chrome.exe 1356 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: 33 564 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 564 AUDIODG.EXE Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2924 wrote to memory of 4148 2924 chrome.exe 85 PID 2924 wrote to memory of 4148 2924 chrome.exe 85 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 4824 2924 chrome.exe 87 PID 2924 wrote to memory of 2512 2924 chrome.exe 88 PID 2924 wrote to memory of 2512 2924 chrome.exe 88 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89 PID 2924 wrote to memory of 2972 2924 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.harpercollinsbookpublishing.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf5619758,0x7ffdf5619768,0x7ffdf56197782⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:22⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:82⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:82⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:12⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4424 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:12⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4832 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:12⤵PID:444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3364 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:12⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:82⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:82⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4856 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:12⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3160 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:82⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3232 --field-trial-handle=1868,i,5717870668832340297,5223293204757183169,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2256
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x510 0x5141⤵
- Suspicious use of AdjustPrivilegeToken
PID:564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552B
MD537e0acab7af566d0d8ea0875c9601da1
SHA1c391923d17750aaebe65a9a654dd0f2d7e40f9fb
SHA2569cc9e3a1e079171feba800408cc18a66d47b95ca3de3c1f9b4482d8cce300e0f
SHA512d2f2e66f3f9f797bd5caf8269822b694198dfd10972190ca63778599f166bbb4640c6cae3b5953a1aa2df35586e3116045e7e205998264933581162b65a4cacc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\139b55a8-4679-48f4-bed3-0321babc93d0.tmp
Filesize2KB
MD57929124e77a49effe6cbaac9a1b5bc5f
SHA10238e3c8a711ac29a625a462ca145bec706471c2
SHA256a14a9bc8df2afc7f9075bc6bef529c1eea1893e7a5855c865c3172f1783088d1
SHA512597c4f22eacddb2e48fd583d30122492de98ecf58aa44708566c1a0e983cf19475f9cf06ccca92b35907224752e7c811b22f221ae63b8969a19c0c362db89ad1
-
Filesize
2KB
MD54b04c651e190840ddf0c90d0e0baa5da
SHA185f18294553483100a1a02a054ca2abd6d887dc6
SHA256d8bc4cf907f5490eeb03c3f2e577ecce71d24c4b910c4d85456c646b3c15741f
SHA5121c13d12a4a23aef3f8c2de605f6e3803b2e39d3609a594a353d906e795af827c71668a5ac0b4abf0a938197faad39a9ce21d78ef7c8ec4a869ff508ff21af3f6
-
Filesize
537B
MD5299cc47f6e9fbdd4b59f2dcf358c4b5d
SHA1414097f07b61794db550930c40857b0e4324588d
SHA2568fad56b1f13edfad1dfc925acb5cbafc66713bd9e08243cc49b2027f2ebabd05
SHA512ac548aaa4e2072438fd4f3d5a3d273150c3042a6eec978b4aaa20ae6e62937a40c0508eff1155bd0da2aca2a1dee56b2206c3262e4df04af09d6fca70d317dbe
-
Filesize
6KB
MD56d2577dd093757884147248e1bd8f16c
SHA18d31a6fa529fb2b3c90903a4b972fbd827a23a65
SHA256125d7a88aeb72e27a20fbe6ecd15818e2a490eeac8753eceadf2d87ad8e9ca88
SHA512b5b7f0eb9cb7a9802159cf4dc4745d82084627d9592e7ee82f5ff134266f416af0ea2522b1c205b37e98b775f890264f577a1a4658198e74b1caeea2c1cd0830
-
Filesize
6KB
MD57b4ff33f13efb499f0c52e6a9221d179
SHA191d6f93c560805f4a560b46137f0386df203652c
SHA256277a32f39546604d6556c0aa38c34eeb00e002e0289b9baf0e0e95ef46d0e055
SHA512f35b17e6bdc9ccf74d286e148c6da1486663c062e0549d5e93bdab46be01dd8004fea43e01b71a996ba9dcc8ef7bc797c361dcf6fe20d23f135475433c3e0288
-
Filesize
128KB
MD504278a9eb85fd6dbecee5844f1027078
SHA1df3266179039fe7a2965a9dc786c1ee6474a265d
SHA2561607f3fee9ecd79618a93cbd7b843958b0c2e83fbc0c8db3fd6abdb35e6f19e8
SHA512a23dc78d0cda5d26fd930461fa3ff8147c65614443251d635e34fc160ea8c7fa4dd93975019eb6204b83c7cdf4a810c9a8026f2f022804437ae47778463d1bd1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd