Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 17:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://github.com/Hibbiki/chromium-win64/releases/download/v126.0.6478.57-r1300313/mini_installer.sync.exe
Resource
win10v2004-20240508-en
General
-
Target
http://github.com/Hibbiki/chromium-win64/releases/download/v126.0.6478.57-r1300313/mini_installer.sync.exe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133626865098402355" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 1740 chrome.exe 1740 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4904 wrote to memory of 3568 4904 chrome.exe 81 PID 4904 wrote to memory of 3568 4904 chrome.exe 81 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 2948 4904 chrome.exe 82 PID 4904 wrote to memory of 1868 4904 chrome.exe 83 PID 4904 wrote to memory of 1868 4904 chrome.exe 83 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84 PID 4904 wrote to memory of 2252 4904 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://github.com/Hibbiki/chromium-win64/releases/download/v126.0.6478.57-r1300313/mini_installer.sync.exe1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f8d9ab58,0x7ff8f8d9ab68,0x7ff8f8d9ab782⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1880,i,3031530468686995188,15727551809225612675,131072 /prefetch:22⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1880,i,3031530468686995188,15727551809225612675,131072 /prefetch:82⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2232 --field-trial-handle=1880,i,3031530468686995188,15727551809225612675,131072 /prefetch:82⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1880,i,3031530468686995188,15727551809225612675,131072 /prefetch:12⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2888 --field-trial-handle=1880,i,3031530468686995188,15727551809225612675,131072 /prefetch:12⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4392 --field-trial-handle=1880,i,3031530468686995188,15727551809225612675,131072 /prefetch:82⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4536 --field-trial-handle=1880,i,3031530468686995188,15727551809225612675,131072 /prefetch:82⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4656 --field-trial-handle=1880,i,3031530468686995188,15727551809225612675,131072 /prefetch:12⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3192 --field-trial-handle=1880,i,3031530468686995188,15727551809225612675,131072 /prefetch:12⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 --field-trial-handle=1880,i,3031530468686995188,15727551809225612675,131072 /prefetch:82⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 --field-trial-handle=1880,i,3031530468686995188,15727551809225612675,131072 /prefetch:82⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1880,i,3031530468686995188,15727551809225612675,131072 /prefetch:82⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3596 --field-trial-handle=1880,i,3031530468686995188,15727551809225612675,131072 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2396 --field-trial-handle=1880,i,3031530468686995188,15727551809225612675,131072 /prefetch:12⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4384 --field-trial-handle=1880,i,3031530468686995188,15727551809225612675,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=1548 --field-trial-handle=1880,i,3031530468686995188,15727551809225612675,131072 /prefetch:12⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5da910e47e031dc31ed0aa64ba4baf6a1
SHA12ca12c6ee1c45b776d9cf54d4c7dd1bb5fce5498
SHA256dcfea3eb631e41967e58e98a666f443b44ca3600e2b18c174e235b4263e9ef15
SHA512d2b6d20aa5759933e07008772a321f66ed3c43ebfc8d0d7e82df2a32f12717864d70e7b6633b2236c7126eeef5c6674c78bb4484429463ccfe5c3d02f766990b
-
Filesize
257KB
MD57024b74f3cb18e77a745502bc6dc7908
SHA1cce18665d03f9c036132ee182659f9a98fbc7799
SHA256a37bce7a73ecc91fc85af1846d4321d3dd8d99e6ba2bef36394bb02494fbcaa4
SHA51277be98400fcccea62b00b553e2d919cecf0de90319be9ba2ba67dee8a1a888ca07f2264c3dfa5e44a18274f71aad1e71977975908fea86d9de50e834ac1eddd7
-
Filesize
257KB
MD5698f93bfcbd073ebdbe5622558d607b9
SHA1268c229ed65dfec671777df5f6b37e46e91a854d
SHA2561f2d4f9a3427c7224d8430c26c3d9ba1a032bbf4385af3ef79893bb006fa6987
SHA512412765db460db2e123331934d27fa1dbd9ac7118d89a28096eb81bdd236164c51a3ffb5f3df08c3607c3ee48b236b06b9e4620a4566ca39de7b5fdd0edb169e3
-
Filesize
91KB
MD565cd2f4153c2e603cbf0533c8c569c1c
SHA14be5537cbf8d1c85bd4f3d89d207bf47be2b072b
SHA256826dc67696a724ec9bea53dc2538224d9c962983338bbfd4505d316cd2cee446
SHA5125b2833eca4525169f3e03f875ef25dd61ab695e2365e9a4bea27473caf90f6b3c58475969412ae29a413a55eff6e8ae9a143d2e98d4586ed6f1650aea64c7c0a
-
Filesize
88KB
MD58a0673141af32506695d8d732abd4fab
SHA140171fc2d92ff7b8d1ee6134dfdcd9af5ba51b25
SHA256f057cab193eea14d7c558aeca671531e1179fc9273071592274f48eaa7640f57
SHA512dc44eb62d66b28191ed1c1883850e662e1288ae65abd5a1d6cf0038fef6e149255732776e2f8145059ea6e0b9543b63f15678da0305ff23bd86af731e18856f1