Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 19:42
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ecomassistantpro.com/dem/lockton.com/[email protected]
Resource
win10v2004-20240412-en
General
-
Target
http://ecomassistantpro.com/dem/lockton.com/[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133580293617889905" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 2840 chrome.exe 2840 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe Token: SeShutdownPrivilege 4988 chrome.exe Token: SeCreatePagefilePrivilege 4988 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4988 wrote to memory of 1160 4988 chrome.exe 85 PID 4988 wrote to memory of 1160 4988 chrome.exe 85 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 4604 4988 chrome.exe 86 PID 4988 wrote to memory of 3712 4988 chrome.exe 87 PID 4988 wrote to memory of 3712 4988 chrome.exe 87 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88 PID 4988 wrote to memory of 5288 4988 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ecomassistantpro.com/dem/lockton.com/[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8549ab58,0x7fff8549ab68,0x7fff8549ab782⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 --field-trial-handle=1720,i,14784819431601053424,2426488476664151554,131072 /prefetch:22⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1720,i,14784819431601053424,2426488476664151554,131072 /prefetch:82⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2264 --field-trial-handle=1720,i,14784819431601053424,2426488476664151554,131072 /prefetch:82⤵PID:5288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2808 --field-trial-handle=1720,i,14784819431601053424,2426488476664151554,131072 /prefetch:12⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2816 --field-trial-handle=1720,i,14784819431601053424,2426488476664151554,131072 /prefetch:12⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4120 --field-trial-handle=1720,i,14784819431601053424,2426488476664151554,131072 /prefetch:12⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1720,i,14784819431601053424,2426488476664151554,131072 /prefetch:82⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3284 --field-trial-handle=1720,i,14784819431601053424,2426488476664151554,131072 /prefetch:82⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 --field-trial-handle=1720,i,14784819431601053424,2426488476664151554,131072 /prefetch:82⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3324 --field-trial-handle=1720,i,14784819431601053424,2426488476664151554,131072 /prefetch:82⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 --field-trial-handle=1720,i,14784819431601053424,2426488476664151554,131072 /prefetch:82⤵PID:5668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3292 --field-trial-handle=1720,i,14784819431601053424,2426488476664151554,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e58c9ee146245f4d8ebc36b321035760
SHA1a984a01529a99ca056fe926654ee8fe85830974c
SHA256638185e20c418c0454067d5ac463f292f1199b507d6fdf446ffe1e0b63039549
SHA512bc4405dd7d702ce811e65d2ca9eabe5ebc642cb9af9b8356819fbc6d9bd35bc96c2081014e5771ca9740753cf945fa9ab82825bc98da6b5dd8ae5393b9bb3204
-
Filesize
2KB
MD5db7115c649b8e05d0dc29cfb6652f0a3
SHA15eb541debdda82452a45d98dbc272a60e5e254dd
SHA2564ccb9ac1d9e160f6e99a9595465430a2dd3ae13d96e45d8cc80ef404f1f4e62c
SHA51274293666fd660148d63ea5fc924e58f8a5be9fb5009d30cea9962abbb73ac9ca865f6c36d60fa89c5e8e593aab425ced3888d883717ebd00515b378ec1841cc4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\f800ad6c-1178-467d-8d5c-d4abfd449ec8.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5926c6a930fa414918a9ef470ae490a56
SHA1e3d090e39131f4e964bc6286b8de16006384cef6
SHA256647e8c42161b1ea1b42cbf36054fe5a6b26b7b88b77f67946b44bb31418e25b8
SHA512a1dbc09c8ca977666764d366c1f4c0a939d13c28997aa791f8cd2bce3257a534ecd054ed03353860d749465ae4d34de4017b26069d87d85131d8572ab63fda5b
-
Filesize
252KB
MD5273f9c4f844ce4288b24be5577d601dd
SHA11049689ea3fa4c0bbc93cfd20b41692ff01cc5b7
SHA25637c97749785c576f5d30aa63da10196fe728725fbb1b8453f0d1da7e9cce1c6b
SHA5129dd96c9032b0d4e040ed796abf7724f56d49991c84112d510d6c7146922b4e01097643c5242383ffbe880ca90c86476bb039f504b0716080d9f06e98c4d3849e
-
Filesize
272KB
MD5e4bc08a387b98a2070dd71df70bb6bd2
SHA12914d96628a15bca425e10e9c9ed23eb49bbdbe4
SHA2562c6a6af844a498d20c458fc7fb3a9f7e6445b9d896ad0bf970a89c5c68641b4b
SHA512ac076989be5d05030b5f19462172e096aacda0ea6c8e0b2d1065134edbd1e3fdf650c54b933d6cf0f0a49ecafcc443b65f7b27588f1f5001940f08c8468aa42e
-
Filesize
252KB
MD5e6eaa3e6a7e1adaa4bf3694c23d14484
SHA1d3e956525afad6e02772a7ec0213df51a7299964
SHA256a598f5fb77232162453d48f064b877f36ec4b9891ff817836648ae5486e87875
SHA512902406663e3f31a2257666898f26586760e595438c181efcf7c35f52cb7f2c60cf589ad15aba203b8581254fa0a129e59650fb389ab290f5d5f311809ed2961a
-
Filesize
252KB
MD508c03b611a71ba36b23963d099cfb1f4
SHA100e5d48161d1aa2e705507c561cd84bfb3e8370e
SHA256e62ba10f423f8a3a1b105541ec5e4db79d9a4e9c4b602c70d4436edd362eb13e
SHA512de211a2dbe2c2e244ccfd1b45abc1f1ce460a47254652d107348f0c4846a1a3bb8271dd97db61574a52d0267961d7a2d67afda73202ec66220a8f1ec8e331e83
-
Filesize
91KB
MD57ee0ec162877a999ca4a851fef7d235b
SHA120a378d3e9589c2533b721f98cff4d649a86c5bd
SHA256f38343e575baaa5cc3ec9ab74b8e8875cbb1098300c3bfafa60029f399218edd
SHA5122a930b1b006014158ab8211abc4f093f034b49f771f60cefbe261d8c98767106b6df9da3d1d09c42b7bee4fea13823ead5a5a086dcfb0f7d61f38a765b8822ad
-
Filesize
88KB
MD5bcabd70e48ef1b78f0cb2ee61b4c769e
SHA1ce3631b0b7f30f0c27a63ece063f0d23702929d5
SHA256590ecdf0ac56fd5eb563347cfc053f8c9ffa5dee6858a4f9b7f95dd262330201
SHA512d79b9d555b3e3cebec352b686e7bb3ec8902ed1c86347c8bcda6cedb088c84868fdac1e0710d54109261d5fccdaae7cf217e8ba0df1aefd9f308d7c5b8ab3618