Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
20/07/2024, 07:00
240720-hs3zbavdpe 120/05/2024, 00:41
240520-a1xs9sbg4t 120/05/2024, 00:35
240520-axpngsbe5x 1Analysis
-
max time kernel
1799s -
max time network
1795s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 00:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ncerned54.de/invite/i=35433 teen leaks
Resource
win10v2004-20240426-en
General
-
Target
https://ncerned54.de/invite/i=35433 teen leaks
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133606394926209711" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 1640 chrome.exe 1640 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4268 chrome.exe 4268 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4268 wrote to memory of 984 4268 chrome.exe 83 PID 4268 wrote to memory of 984 4268 chrome.exe 83 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 712 4268 chrome.exe 84 PID 4268 wrote to memory of 3744 4268 chrome.exe 85 PID 4268 wrote to memory of 3744 4268 chrome.exe 85 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86 PID 4268 wrote to memory of 4624 4268 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ncerned54.de/invite/i=35433 teen leaks1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa4b0ab58,0x7ffaa4b0ab68,0x7ffaa4b0ab782⤵PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1948,i,15825068614751402749,18257295466479579541,131072 /prefetch:22⤵PID:712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1948,i,15825068614751402749,18257295466479579541,131072 /prefetch:82⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2280 --field-trial-handle=1948,i,15825068614751402749,18257295466479579541,131072 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1948,i,15825068614751402749,18257295466479579541,131072 /prefetch:12⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1948,i,15825068614751402749,18257295466479579541,131072 /prefetch:12⤵PID:3604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4388 --field-trial-handle=1948,i,15825068614751402749,18257295466479579541,131072 /prefetch:82⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4368 --field-trial-handle=1948,i,15825068614751402749,18257295466479579541,131072 /prefetch:82⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 --field-trial-handle=1948,i,15825068614751402749,18257295466479579541,131072 /prefetch:82⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 --field-trial-handle=1948,i,15825068614751402749,18257295466479579541,131072 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3960 --field-trial-handle=1948,i,15825068614751402749,18257295466479579541,131072 /prefetch:82⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4076 --field-trial-handle=1948,i,15825068614751402749,18257295466479579541,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD59fd474bb21ca0e1a97fef0b99ec74673
SHA13631a9640fc672dadd2950de8a3c663ca16695b2
SHA256576dfa3f20faeae90d7573840a2785854947a3b3ebf289ec11a165fa5be5c60e
SHA512a342528fab9fccef8aa047f6d1d2b4a00f7ba86172d521e6516b34ee903fdc880bcbbeb8a91e1193ed9ff2d006ef03f4cf4d4c81a0865afd17ce30597d58de90
-
Filesize
96B
MD5dd8179988d3c53020b7c5e5d780e2b70
SHA143919a4c813709a42ca1d3b656c5faea98876c9c
SHA25698a0ee20e1ec139a06389c7f9a7dd7d8630a70b948d296a1225cdafa1ea1eebd
SHA5127794a0f5e16aa5dcb46885ba606c33dde0e26504a369ea3a46454aefcfc3dd13159f5fb8dd6c1ebe4a049e0c2bd2e6445b2cdff83b5ddd16bb5696a0de17595c
-
Filesize
2KB
MD5ef9a11fa0d3a605f3ae205cfaaa0e5ac
SHA1dcadede1a4f590a2be271681ac5d962ece6e2301
SHA256fa4241e7220684a5b6735583e5a30c959c042521e03e22a54eefa5e4fa8be21c
SHA51246bbcf6b523625961b20845df4e1beffdd11b0ce22b034d885e5abc4542f9822859fbe177fa0a4137e0fc63ae35bb66598d182137a61b6fd4aabe644915fcaf7
-
Filesize
2KB
MD53f03e9e8a446d3a9a38b804079f8cb1e
SHA1a35339470859e11076b287a7157407ee79293e73
SHA256452a13de75b0446d020c6a68effab81275b683c2f9bf2ecbdf103313acc48db8
SHA5124119a421007fb1f6a9d621928a3c89222b4d7adcab442e7b210acd4b541398e913a7c4b639a439f995f744ba837ce7c2db487d85cf023e035b59801effbd2c9b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD550aaf3108712bdf3445130a2c3a23dfc
SHA1de05de2d707b3c43ace2a85ea1d63df5b8df021f
SHA256ed0b0897fe2ff707583c325b53ed06c5570a84e5b0d61ea7a574bcaf87c0b1ee
SHA512607f3306083928fb2cff634ea504706cafc9e0ae55cd3321590c53d22dfc017fbc6f6f003cf928fbb44ebd20481500a97075e6f7df61a64d7570dd2852c70eb8
-
Filesize
131KB
MD5805a517da36f9bff4cff484f45b7510e
SHA1c6c2d80ae8d940c49cd82d204ba685e8cbe64dd5
SHA2560579aa8547d0a2b32b222aa4f2f4cae09c47e4a99ee0cf519d08173c3bc26c27
SHA512e77732b0ab89fd59a7c2e6f8c73d3ac3f1816983e323afaeb8262a115b738da1906a768d43c0e8cdeb8c0074a938a7d73f302c586f57691fe97e30c88d80c05d
-
Filesize
131KB
MD5c7079996c274e1bd9144aff73611dfbb
SHA1afc08ee78858e5fb5a3f218736a9e7aef2b47636
SHA256e3374744213020cbc5d0d113c8c0eaa2017f5ee036a60eef4da0caf4b2148b0c
SHA5128935ab36b302937cd96bd341fbd33ebe40e312d54ad4edbb2cf709a7ef14bfaeec47861340d578b12bd710be97037b69232183f617040bef0fd22a25e5000aaf
-
Filesize
132KB
MD52247f096e843398184e7e1d4656528f1
SHA1d05c26924ea5cdc006d4e8fd850c23d8c2270605
SHA256f6a21ac32be593cd728d4770788bdef20a13e5e27bfcb128f9995a578ae68753
SHA5124b90e2f1c8902904a623bcaaa8ce516244d0402970d87393b2f89a27e77a5f812d54b1b8ac6dbbf31482cfc899b3f6500e5d13dd180ed6a29dd17b259e4a2003
-
Filesize
152KB
MD5a78b93d374e1490f22db5d51fcd0b157
SHA1262275b91c3650574ebcc7f99efef170ecc9bccf
SHA256ca7dfee586eb6c4399233f98e55c1570166d69670c49603873a3e076e3b7dcf3
SHA5129922516607ddf8ffa8558dbc5358ae185a611cb65087105cd44129ef65f4fcdc2d655a054707ccf53819abec3a617797d0c8cbb27d51171af1e9eb26c6d4a67d
-
Filesize
88KB
MD5ff2b9702aea4a335f02928265dff2c87
SHA1ea4f93fcaa146956bf48e311d4f9aac258ca5f44
SHA256f59537b5ae1384bd72d0df945525ef02c4d7a720adf23bc1d5b0b5ef44b107ad
SHA512ca16759abaad2cbe70209ffe009e08fb784fcbc459c6ca80ef9c99f63aa7c92d614188141e25f82c153da9a34654bf5c4321f573ceb67f89ab3f534954f0eae5