Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 03:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://flow.page/myyg00vv
Resource
win10v2004-20240412-en
General
-
Target
https://flow.page/myyg00vv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133577964769518070" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4916 chrome.exe 4916 chrome.exe 4360 chrome.exe 4360 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe Token: SeShutdownPrivilege 4916 chrome.exe Token: SeCreatePagefilePrivilege 4916 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe 4916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4916 wrote to memory of 1504 4916 chrome.exe 84 PID 4916 wrote to memory of 1504 4916 chrome.exe 84 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 3228 4916 chrome.exe 86 PID 4916 wrote to memory of 2780 4916 chrome.exe 87 PID 4916 wrote to memory of 2780 4916 chrome.exe 87 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88 PID 4916 wrote to memory of 3660 4916 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://flow.page/myyg00vv1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff98e8aab58,0x7ff98e8aab68,0x7ff98e8aab782⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1612 --field-trial-handle=1900,i,17819186630291902155,6575897294895826123,131072 /prefetch:22⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1900,i,17819186630291902155,6575897294895826123,131072 /prefetch:82⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1900,i,17819186630291902155,6575897294895826123,131072 /prefetch:82⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1900,i,17819186630291902155,6575897294895826123,131072 /prefetch:12⤵PID:424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1900,i,17819186630291902155,6575897294895826123,131072 /prefetch:12⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 --field-trial-handle=1900,i,17819186630291902155,6575897294895826123,131072 /prefetch:82⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4424 --field-trial-handle=1900,i,17819186630291902155,6575897294895826123,131072 /prefetch:82⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4660 --field-trial-handle=1900,i,17819186630291902155,6575897294895826123,131072 /prefetch:12⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4068 --field-trial-handle=1900,i,17819186630291902155,6575897294895826123,131072 /prefetch:12⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4920 --field-trial-handle=1900,i,17819186630291902155,6575897294895826123,131072 /prefetch:12⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5068 --field-trial-handle=1900,i,17819186630291902155,6575897294895826123,131072 /prefetch:12⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4012 --field-trial-handle=1900,i,17819186630291902155,6575897294895826123,131072 /prefetch:12⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1900,i,17819186630291902155,6575897294895826123,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b212a798db3b717b02ca67e3ca5c0bef
SHA18f664bbee4804fedcc4293b697aa191b1f9a166e
SHA256f6789b1579e3915acc50ce2f56d956c05dc3186238eb4d1a0d4ad1e403a625ac
SHA5128c3e14a372bbbd1eb59ec1b0e82249cbebb6db1d9e75f6aff2e51dbd1bdefc44aef96cc98259c7a33a762465fc8b409baadac993f1c69c60013f7c75a5ce488a
-
Filesize
1KB
MD520d67d226f0885cd67b532953ae62493
SHA1b267de29484f8518b221edacae0dc004fcb51d5c
SHA2561b18c2832a3f3eccafde10c21a0fba45f4a0cd51da6906dcee0e9e7725a3b360
SHA512fd34a9b6299d54d9870d8b144caaa7bb77e90a8625120a21dc75fb1e8e351a7ad44a89d90afb243a0e485d03efcabd29d43d27606fb106f7c20bf0981f55dd69
-
Filesize
3KB
MD5a6154758ecaddde0a584b0ec0a43e9c7
SHA157b474e92899e73da35b0c266c357830aaef39a4
SHA256e88643afc6b97329cbc32987ff6cfd49963d77cf2c691fa1192a9ca2a0cd2a46
SHA51206ca88cbb59833a43453d18a92d818a5e6cab64e644d60eee202bee96294ec3bb9a657f80397c17dd7ef7eae9b37e5cd58d9118ef7dbf6579b979d14189ee7e6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD51f32906266f163e949e8c85f4a66a475
SHA15ff189fdde9866f9eb5618654869c7676762c8f5
SHA2562e975dbdec5465a642a595f9a6d4bb4778eb3445d31ad8bd994a3be6c803faa7
SHA5120b895dec4a072da662a59c94c06a050a2d6e55d75fd2ee673ef4d918ea4dcf0247de06f3c797f7e6e2dcba39657846f6bd267addbb181171db095c0b76782b4d
-
Filesize
1KB
MD5e29c385fca5f2594793187f049f2073b
SHA1bab3a3a3bc7b9c8d82ab214d2db2e0a5b9c83977
SHA256dd295744abc820149711cf2f7d740341e7f39fb2100cc3322a3dd2068056da3e
SHA51200f26ccf4c520152336b56aaac7936a3d2322f67ba8b88cdf5cd548d728ed584ee599eb1593ee8c3ea730805a5a9790bf71dd477dd073373046b8969fc12a083
-
Filesize
7KB
MD5f65fc801e0aafcd140c8792927eb72c3
SHA185f367e4b33f38939c2ec728b13ea44144b6f423
SHA256afc11b80c8e75a7fed8c593e44bd39c14e483a1c4b867c7c8aeeb328f82d18d9
SHA512e0187e664fea0099f54508d49ca81aba38c84bfdd71553851da706bc30e6104218b63aa190b8af1d3d76259ba3523ecb4da07a0bf53b3648e71605e2242e8e86
-
Filesize
7KB
MD5ff85d84c0727cfcbe1b1ddfc9a436b48
SHA184f33cbdd1afa6576741b404030873082528bc67
SHA2569d47ccfae7e7c9f171357db48988c126b89ad35209605c2ed58592c61b05db87
SHA51260d7667fe63c103491720abf0b680c898ff8931c714b4f648e0833c067ee0f1fdf6ea01b5162f17c4d3e107becf286c7adfbcb0e1fde9e2afbdf01b2f2705875
-
Filesize
250KB
MD57c0a3130dd8de3d317b37b2ec14230d4
SHA1a22f79ae926b5d55e8a569b02595bec13abef95c
SHA256b03822181d686080e4553d0167a4a6be58cd74d447d5e7378ea67427f5e7ea98
SHA5121b3623941eeb62c9655711881f29b296a20240336702d9188918be537bb0e77befeae5975d29a4bf186742753e547d06e49eff0d372a37fee248b382c0fbc2c6