Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
25/06/2024, 22:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://mx.torpig-sinkhole.org
Resource
win10-20240404-en
General
-
Target
http://mx.torpig-sinkhole.org
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133638270436665074" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 168 chrome.exe 168 chrome.exe 1608 chrome.exe 1608 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 168 wrote to memory of 4472 168 chrome.exe 74 PID 168 wrote to memory of 4472 168 chrome.exe 74 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 4800 168 chrome.exe 76 PID 168 wrote to memory of 2248 168 chrome.exe 77 PID 168 wrote to memory of 2248 168 chrome.exe 77 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78 PID 168 wrote to memory of 3200 168 chrome.exe 78
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://mx.torpig-sinkhole.org1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffaffc09758,0x7ffaffc09768,0x7ffaffc097782⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=2000,i,803893888522863815,8477193008029150294,131072 /prefetch:22⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1772 --field-trial-handle=2000,i,803893888522863815,8477193008029150294,131072 /prefetch:82⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1840 --field-trial-handle=2000,i,803893888522863815,8477193008029150294,131072 /prefetch:82⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2600 --field-trial-handle=2000,i,803893888522863815,8477193008029150294,131072 /prefetch:12⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2608 --field-trial-handle=2000,i,803893888522863815,8477193008029150294,131072 /prefetch:12⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 --field-trial-handle=2000,i,803893888522863815,8477193008029150294,131072 /prefetch:82⤵PID:400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=2000,i,803893888522863815,8477193008029150294,131072 /prefetch:82⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=2000,i,803893888522863815,8477193008029150294,131072 /prefetch:82⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4884 --field-trial-handle=2000,i,803893888522863815,8477193008029150294,131072 /prefetch:12⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5012 --field-trial-handle=2000,i,803893888522863815,8477193008029150294,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4468 --field-trial-handle=2000,i,803893888522863815,8477193008029150294,131072 /prefetch:12⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=824 --field-trial-handle=2000,i,803893888522863815,8477193008029150294,131072 /prefetch:12⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=764 --field-trial-handle=2000,i,803893888522863815,8477193008029150294,131072 /prefetch:12⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5081c4aa5292d279891a28a6520fdc047
SHA1c3dbb6c15f3555487c7b327f4f62235ddb568b84
SHA25612cc87773068d1cd7105463287447561740be1cf4caefd563d0664da1f5f995f
SHA5129a78ec4c2709c9f1b7e12fd9105552b1b5a2b033507de0c876d9a55d31678e6b81cec20e01cf0a9e536b013cdb862816601a79ce0a2bb92cb860d267501c0b69
-
Filesize
72B
MD571e12a1b5ce1aaac711442039125b575
SHA105a9f7410c6659d67f8a25d9353c362ed7ccf081
SHA2563a9fe3d624a30def169d86aa6d32a9d6adda6538428233c40a938d15a362e297
SHA51297deccc680b77c9d4ed8804e92feb08d76f494b56b56aef893c575c2ef17ee5b69ed9a18d207a64c03c2d4882ea8a6cb4f0a74a18abad185c74b1da35ce6d90a
-
Filesize
691B
MD52981d4f23cc39d1780b657ef1355b97f
SHA165e1ea5e27495bc5931ee32f09e9114d971c58ba
SHA25680c5649eae47af14bd119ec12677187c76dc3759420584b42163f6a195ee51ac
SHA512f1f25b9a4236c0d22e883523c9d1b1e2e00b26ede141a688fd740c6fb3955fbcd7a3a5b80e9deef91935a720576434149beb7b0962c2631756bcb9078e462ea3
-
Filesize
6KB
MD5376a4a9a623302fd928cb849f012807e
SHA129637b31aece6972180524e8827f3eff7cfd2756
SHA2566b188dfb6c6d73427bd6b5decf5025f958a1f023875a0d0998cb55f3200da0d4
SHA512a2e6cb233dc790b8fadbbc6f303a7fb63615f1c9cc25948bb28df9dc520f5e3d8f22516cf76c78a2124220c50dc0f1d3823f6950fd37e7499a0b5217f45a7aa6
-
Filesize
6KB
MD5bda07ad480c72167ebb027be2b48e5a2
SHA1d48701afeb6ed28bc2c2fac2b752ef445e2c74ff
SHA256ff7be51d6bd8517f91a6aecf6a39ab31e78bcd5071a1eb55ecf6fa4d85989f3d
SHA512719692ab2371ecd7720d6a74596bb52a4a75c59164c9f17324c8b11c73693fcff9b6983544c44b23e37e5cadc088f97fdea9a1a5f0218817040090bb04ebffb4
-
Filesize
6KB
MD5122bf0f827b024774e1b63dc574366a3
SHA17caf2d0781dad82f61754387236c565fb40d7c63
SHA25601df5fdbb8d46fc8b6fc69074da370be4b944bfbbaa03dff9cf6eca40aa64405
SHA512bddc1c6b9afd2dfcb7331e802cbac145f758bf0415a29c715a0dd45df7c829c17d61e50a81aeafd987cf7cc91f7228fcb3e072d6f5205b1bb6e81466fb67b674
-
Filesize
136KB
MD57671bb5039c590abc7980dd5539af225
SHA195a1fa668434dc2c5caea14c1e20eff605a96bde
SHA2562d2da5026b4d6bbed72b2c1db7fc91300a1127c908c11d919f3298b9884609cd
SHA512c89b3560977c57ab405aad67d05497eca868562befd3888db0282350d726a0bf764a572f447931e5506ae4b1266f9bd7b4d9cd80b26e65b103da0ec61321997e
-
Filesize
94KB
MD5caf1f6c39b22f24f2a6f2cf6e782a567
SHA1700f510f74a463fe2be134da7798668969600884
SHA256719b88bec1e33769ba8e33673e5534240b655fc534ecfb5bafdd31d41b4120a2
SHA512aeb9c1de54794da5c06424572b843aa42398511b5fd455651252ad0ce8326fb1276c6d716275f6cf55142353eb8f97a3e48985e1ef8a44c5757745558cf78119
-
Filesize
93KB
MD57ebf67c2bb00c8bd1236e453be3e7966
SHA1489ff4689004a2db217987d0dbc6f6ba9fa480d2
SHA25650646836244091be1ddd826a325884d30b43e48a0c79cad97b01a6398a22a98a
SHA512fae80ef1fd26d931891e86e5c0d3c24b3b503b68a0bf7a4846526221067b2754eda84f4c73ca666acd6d75dd37a5f64ef5853aa0e9790e2d3ce569893dc4f21a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd