Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
105s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
1992cf9a67fb4425.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
1992cf9a67fb4425.exe
Resource
win11-20240508-en
General
-
Target
1992cf9a67fb4425.exe
-
Size
337KB
-
MD5
50280002e4fde1433c6c80a1178c2774
-
SHA1
27b3a07a5dd9edaeb7f3379e2fd023f72f779586
-
SHA256
d9aab9d934e3cce61759da398a607b7a2280b592269cae62a4ca2530b5bf4833
-
SHA512
8b9d2b96c7d4362d75656e108e7809d6bcad083f978a9b8d3aae00eedab029bffbbd03b756afc8c4a984d37f2a97361e99cac0f6e724cfa2b82f448949073271
-
SSDEEP
6144:udxWxRzGrfgHtJ7Z1taVeEL0BJDYaS76Faf/1rGbqjSSmjeP:udURzhbftA4HsaS7x/JGb1SmCP
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/408-1-0x0000000000400000-0x0000000000552000-memory.dmp family_blackmoon behavioral1/memory/408-2-0x0000000000400000-0x0000000000552000-memory.dmp family_blackmoon behavioral1/memory/408-8-0x0000000000400000-0x0000000000552000-memory.dmp family_blackmoon -
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\1992CF9A67FB4425.EXE 1992cf9a67fb4425.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\1992cf9a67fb4425.exe 1992cf9a67fb4425.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies Control Panel 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\Desktop 1992cf9a67fb4425.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\Desktop\LanguageConfiguration 1992cf9a67fb4425.exe Key deleted \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\CONTROL PANEL\DESKTOP\LANGUAGECONFIGURATION 1992cf9a67fb4425.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133617603601073688" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 408 1992cf9a67fb4425.exe Token: SeRestorePrivilege 408 1992cf9a67fb4425.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe Token: SeShutdownPrivilege 3068 chrome.exe Token: SeCreatePagefilePrivilege 3068 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe 3068 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2500 3068 chrome.exe 108 PID 3068 wrote to memory of 2500 3068 chrome.exe 108 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 1352 3068 chrome.exe 109 PID 3068 wrote to memory of 4532 3068 chrome.exe 110 PID 3068 wrote to memory of 4532 3068 chrome.exe 110 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111 PID 3068 wrote to memory of 4064 3068 chrome.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\1992cf9a67fb4425.exe"C:\Users\Admin\AppData\Local\Temp\1992cf9a67fb4425.exe"1⤵
- Sets file execution options in registry
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
PID:408
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4604,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=4404 /prefetch:81⤵PID:1940
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffda38dab58,0x7ffda38dab68,0x7ffda38dab782⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1932,i,16892089288796895679,11984906020430774105,131072 /prefetch:22⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1932,i,16892089288796895679,11984906020430774105,131072 /prefetch:82⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2240 --field-trial-handle=1932,i,16892089288796895679,11984906020430774105,131072 /prefetch:82⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2160 --field-trial-handle=1932,i,16892089288796895679,11984906020430774105,131072 /prefetch:12⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3136 --field-trial-handle=1932,i,16892089288796895679,11984906020430774105,131072 /prefetch:12⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4396 --field-trial-handle=1932,i,16892089288796895679,11984906020430774105,131072 /prefetch:12⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4404 --field-trial-handle=1932,i,16892089288796895679,11984906020430774105,131072 /prefetch:82⤵PID:892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4628 --field-trial-handle=1932,i,16892089288796895679,11984906020430774105,131072 /prefetch:82⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4644 --field-trial-handle=1932,i,16892089288796895679,11984906020430774105,131072 /prefetch:82⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4920 --field-trial-handle=1932,i,16892089288796895679,11984906020430774105,131072 /prefetch:82⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 --field-trial-handle=1932,i,16892089288796895679,11984906020430774105,131072 /prefetch:82⤵PID:3224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5104 --field-trial-handle=1932,i,16892089288796895679,11984906020430774105,131072 /prefetch:82⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 --field-trial-handle=1932,i,16892089288796895679,11984906020430774105,131072 /prefetch:82⤵PID:5168
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD5042cd0d9c8b2ceb14bf47387fbd45364
SHA1fcfe09eec61e24ae6f7e37252b6c404c0b5b67f5
SHA25603afec252b3a4b1ed6b4ad5d8323261a6276458ec94d73b347223088e193108e
SHA512d95c56676856092cd8c883475efb700227265161adffa2979251a586d9f18ec6783d5bd4bd6ff842252c48cf6ab5d81d529258e51812eb60faf08247bb1b6187
-
Filesize
6KB
MD51ddac0b65dd67ce2fee792bd8bcc88a3
SHA10496ce454b9f63ef058d79d9369a2eed633ea768
SHA256c68d8e9d21de6b75a4ea2e6c492616da333f92843c9fe6e30682a0bc87ca02ba
SHA5125b50c6d2442e398275c79f218a8b51f13585d7cfb985d4a935c9944d3934894ea6a382e79f96d97b10fb81767d60f9320509dc4fbc566a87281a92b95fa03125
-
Filesize
16KB
MD5d2dc8e89ff86763e0703f3c4e0c9e9e6
SHA17dbaf7496a13677a76e0e9587a36c81b93f5404b
SHA256d8490e6d2960e56e0261ebecb859c9975ba03f520ff236f6c9eb5edb07b40a78
SHA512b21c16feae421d8d07c34ebcfafe0e2ae98006f3d778f05750b3a00ebe7f81b38af8485a77657b608c0914c1eed44b8ca3318fdd54c742cd3c21b7d5ed165e5a
-
Filesize
261KB
MD5205e73d543202d92870005277c59aaf1
SHA174777b10d4f9dd71bf660235c0f44b4c12c70d4c
SHA2562eb898392782a78ad7c4def5cbeaf6d2a86cd85c7e8546338b01dc1ce4a91aab
SHA5121c8b20a0826f413c74bc1730e0e2ae3c1e2590881919d36eba85261a2ace71b4e7bf9bf53eadee917b90c5846342e81a957241db7cb2440a6f9ca6eb60d6248f