Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
274s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 11:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1234958894225162311/1238819202354122842/reshade.v2.exe?ex=6640abc9&is=663f5a49&hm=cee2ec27c79a1528b9bf8e230d1b487472de5518d8734698b7e1a0e2b6022009&
Resource
win10v2004-20240508-en
General
-
Target
https://cdn.discordapp.com/attachments/1234958894225162311/1238819202354122842/reshade.v2.exe?ex=6640abc9&is=663f5a49&hm=cee2ec27c79a1528b9bf8e230d1b487472de5518d8734698b7e1a0e2b6022009&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 4080 reshade.v2.exe 1856 reshade.v2.exe 4064 reshade.v2.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133599016121817283" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4148 chrome.exe 4148 chrome.exe 4780 chrome.exe 4780 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4148 chrome.exe 4148 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe Token: SeShutdownPrivilege 4148 chrome.exe Token: SeCreatePagefilePrivilege 4148 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe 4148 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4148 wrote to memory of 1628 4148 chrome.exe 81 PID 4148 wrote to memory of 1628 4148 chrome.exe 81 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 3516 4148 chrome.exe 83 PID 4148 wrote to memory of 4280 4148 chrome.exe 84 PID 4148 wrote to memory of 4280 4148 chrome.exe 84 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85 PID 4148 wrote to memory of 3300 4148 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1234958894225162311/1238819202354122842/reshade.v2.exe?ex=6640abc9&is=663f5a49&hm=cee2ec27c79a1528b9bf8e230d1b487472de5518d8734698b7e1a0e2b6022009&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd092cab58,0x7ffd092cab68,0x7ffd092cab782⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1864,i,8159591096541524025,5127211549859577980,131072 /prefetch:22⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1864,i,8159591096541524025,5127211549859577980,131072 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2244 --field-trial-handle=1864,i,8159591096541524025,5127211549859577980,131072 /prefetch:82⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3032 --field-trial-handle=1864,i,8159591096541524025,5127211549859577980,131072 /prefetch:12⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1864,i,8159591096541524025,5127211549859577980,131072 /prefetch:12⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=1864,i,8159591096541524025,5127211549859577980,131072 /prefetch:82⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4724 --field-trial-handle=1864,i,8159591096541524025,5127211549859577980,131072 /prefetch:82⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4756 --field-trial-handle=1864,i,8159591096541524025,5127211549859577980,131072 /prefetch:82⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4040 --field-trial-handle=1864,i,8159591096541524025,5127211549859577980,131072 /prefetch:82⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1864,i,8159591096541524025,5127211549859577980,131072 /prefetch:82⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4860 --field-trial-handle=1864,i,8159591096541524025,5127211549859577980,131072 /prefetch:82⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4708 --field-trial-handle=1864,i,8159591096541524025,5127211549859577980,131072 /prefetch:82⤵PID:3304
-
-
C:\Users\Admin\Downloads\reshade.v2.exe"C:\Users\Admin\Downloads\reshade.v2.exe"2⤵
- Executes dropped EXE
PID:4080
-
-
C:\Users\Admin\Downloads\reshade.v2.exe"C:\Users\Admin\Downloads\reshade.v2.exe"2⤵
- Executes dropped EXE
PID:1856
-
-
C:\Users\Admin\Downloads\reshade.v2.exe"C:\Users\Admin\Downloads\reshade.v2.exe"2⤵
- Executes dropped EXE
PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=740 --field-trial-handle=1864,i,8159591096541524025,5127211549859577980,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a3e08a973c2a59ff011ec9203e2169f1
SHA1bdcebbd23d9ec7c071750bbe8d83c6430f00677d
SHA256c50a0aa4548b0badd5e68d418092dfc4b1fd52e0b28c7d75d7dc79dd6dfdca40
SHA5129e0c67a6ee3b122f2ae01bf870fa4b5ccd8ec48792dc0847b814d721c0aab4298183b7d9c9bb828eeb4256c333e410aa52cba067ae71368072f2ec0b954616d7
-
Filesize
1KB
MD5abba064a0394d1f40a26a22a37361735
SHA1f96a373d2e94f1013ba539a468589855c653a799
SHA2563f43b6810487241c01fc5009d99308d0f35762f1c528f819a9c74a46e3e5898c
SHA51229b7fef9868f0a880231f90aea7c86aadd73ce39e75526e3442fb8dc83048e3523addd4c74611f8c1273d49ed74fc400ac6793e05125333c7e24e45e842ba903
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD51d0536dce2ab9e9c9157838f07b499c9
SHA11742c18a8253896fc81f9594ee473ce6560c73a9
SHA2567755f2b7d8dcef9ced0a09fea0f3f1f1f0bdea87fba762cff3dfed05cd9b0e31
SHA51288bea91d4ce24b91f1811cbfa2462d4c70633e4cc5d78be9013f48063a586aa1abc2a4de8d0c58610bc64bb34b8b9e27932413e5835c1519ac46cfcd7dd2dd0c
-
Filesize
129KB
MD5f5494d90185bf1d6cbaa7f0f39bca2e8
SHA14303d257f44a4dddda18b95c125ffd21b226629e
SHA256823470be76201e976653229e1fe3e8a119d2456aabcf93a5240d427ed7fb2bc2
SHA5122463918c286dfb81fed64f9bc23a8157c8bf9b961df65f15b769f6f22cf07febd3cb2e33dac4bf6d176e07d9517215d62bd74f1e661c663a5ce4775d5972c862
-
Filesize
264KB
MD55a78f297d3b3c9d31a11bc173eb993f9
SHA18a1715c052191f2d0666b8be07ec44e726076942
SHA256a0a65e552cb27f92925f1e95b33ba6b2389d20820dd16691a755390a82e9ea48
SHA5121327b532f4bc6a128ea1d428c947b0e9b0cdfddc5d825f75a1a4243d3781925d8804519b9202fb4a447a77bc9a27bd477a02eb5525aa9da36dd454aee6c973b2