Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
09ac94260d534ad5175b.svg
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
09ac94260d534ad5175b.svg
Resource
win10v2004-20240802-en
General
-
Target
09ac94260d534ad5175b.svg
-
Size
1KB
-
MD5
157ccfe93c91db60adddd48a75b69205
-
SHA1
eec7dffa37f7387d2418d8f14a5967a6d51eedb1
-
SHA256
122fe449aec7835888e02aa8ec6995e75da859bb6f283ae62d8b945523377119
-
SHA512
bc4be95fd40546ce636dd589ef63fd3b54acc48da2f1ae639ae04f60d09cb92d5703a9d4e32a761c582de4cf91a213a0b26917186d99cc502bd59ef8e9e5f30c
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133694019272466071" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2872 chrome.exe 2872 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe 3468 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2872 chrome.exe 2872 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe Token: SeShutdownPrivilege 2872 chrome.exe Token: SeCreatePagefilePrivilege 2872 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe 2872 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2872 wrote to memory of 1400 2872 chrome.exe 84 PID 2872 wrote to memory of 1400 2872 chrome.exe 84 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 456 2872 chrome.exe 85 PID 2872 wrote to memory of 2836 2872 chrome.exe 86 PID 2872 wrote to memory of 2836 2872 chrome.exe 86 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87 PID 2872 wrote to memory of 1800 2872 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\09ac94260d534ad5175b.svg1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffeebe8cc40,0x7ffeebe8cc4c,0x7ffeebe8cc582⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,1674803063098112250,6818419111854681542,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,1674803063098112250,6818419111854681542,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2188 /prefetch:32⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,1674803063098112250,6818419111854681542,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2428 /prefetch:82⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,1674803063098112250,6818419111854681542,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,1674803063098112250,6818419111854681542,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4604,i,1674803063098112250,6818419111854681542,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4612 /prefetch:82⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=728,i,1674803063098112250,6818419111854681542,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4820 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4504
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5f403d84c9ca95cfed2e2fa932ff66fed
SHA1c340095d00b42913248ce74d67297a99b0258666
SHA256ae01a95d1d275272a270f595384947330872bf3331c053f8e200511d87784fa0
SHA512d15a7558470a63b10b7bbfdab90b14e8eb9bbe8d0216e9dc48dc6c7a0bfef6aaa46263c2cc8dd9068c7d249e86ab7dd614f02bc5a33e7d5109c2b1b8d90c0c83
-
Filesize
1KB
MD5ae7004ea8c7b02290947450278c96fc3
SHA1ae0b20014accb3d53aa56352e15ebcc847aaad08
SHA2566f98b5899fff28e48008e76e494308e93e03f61a14e8d76ad4afc8b0f3f61f7c
SHA512e595fce5e2bd65912861016e1be5708bd24446b87f96ae8f72fe642d66c32fe245865c108cac98ceb312549b8bbd16648e9cdd8c174f409a3d64ee4590252fd7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD5640ec9b15e69e9480f2aac12c6b8e6db
SHA17a20860f597913a3b83aeaa7a1f0309c9c9377ba
SHA2561351f8ef1a79a4ed719a84d0288db95653357aea3621394def8a5efda973be62
SHA512a8f15aa89e55647f6c8d2e4671c0f3beab7ffb0ea8ff591d8711a5f0b4e90532bad5a2ab7da8ee0d1724115ef3838de66b86b97aa0311bd92cc8f32525177ff8
-
Filesize
9KB
MD55ac1da85d1cb515ea7e697fff5238429
SHA142b63b80fc09b227b5bab21199876b6d879f4269
SHA2567cad51ea53a2a683270f8b7bb57893a50e649a7f8f1a764bc1df13e30669c687
SHA5129b4dabcde2926358bc52619fabe5d23b44a08be664e5b180b45579b63dfd24e982c5f9e19ac0848cb5f724567e62fb0e6bbfbe197240a3fab1dddac8ae6f9e7a
-
Filesize
8KB
MD50f2e09ffaca6804ce3fe0ccb971a3251
SHA1448ce6ca45f585dc3508be9c511a2a810bafe006
SHA2565bbf585b0c2832d98f9b9787a017170c43db631cdcf470a154930e1b90a2e589
SHA5129d9f803cc1f7e3bf823e38d8fe2f0ae6961df999b063f17c8e806ea223e22cb6c38ba09f7be16e3a4fa6a7e6ed3d342f25d6cff09c805788c7ae42b07f1e979d
-
Filesize
9KB
MD53885b3d9e8ddf2d437b6a8ce444f33d2
SHA1cc1e41f45972cec051f5bf73a759f8da0e8ad8f7
SHA256d77f5752c48c6728f9824b04b2d4415bd09abd034139deea8b427cba63de53ed
SHA51243cb53cabb5e1be2aa007601fc4e67c59f5cdff9e5e63e545e71b277721e896dd88cbb4cc68faa876636abdb7b7011f6362b2374e6c4b3e8de243fb34a85e94b
-
Filesize
9KB
MD55f00b10c552ee3aaf4f95cefe0392392
SHA18ef71079efbb87e09956886c7d31ee5dbf984ffa
SHA256b066a4b8fa0585fca5f16f300a75849e11147e02e458a24d2d8128713a2be816
SHA512a20c1bf36184fba365d8895229fcfeca2ad315d9b46823fbb192d1133af8a30dc750a0773cf19e43f6b88e4e516c401e06d88e3ab9528e88ea60e24484e0017e
-
Filesize
9KB
MD5dc15d2a8162f2db731bc07c2f6f6756d
SHA192b7379457efe0fb6fe8f64fbcaa352a2a70e683
SHA25600970e08b10444600f7be4f797fe884d3f18e6a4576a7ca18d737e34cb3c394c
SHA512e1e92719d1e92c9f4c30a3a8ddfd260d17cc9c170682457908368942cfff16e01db78f4aeef8b8fc1c08219a4c6313026bdc22728729eb3eefbfe450e99caa0f
-
Filesize
9KB
MD5e3165d212bdb0f518c379819e684ab83
SHA168847e7ca5782f851737f860f720a8db4df86829
SHA25673428757dee4aa463d99c462148d79cbbd0db4aba7429b2e37df872053062151
SHA512c28644a50e0ee684c2f737fd590a93474d48ac8ce3cc5d78ebcbc9a28a2ac7b817b7ecae44b05dfe5270683e0ea497348b89afc735adcb7032c74777e4bbba1a
-
Filesize
99KB
MD5dcf00c9a1a6352a50c3641609b5cf162
SHA16f31c2b43dce504fa261ae52a4e15e7be4a923cb
SHA2567e150696196c9e6f70d54e14e249dd3cc9e5921746837700edc93a26da10dd76
SHA512ca86fdc2167db33ef588e79060f577c50cb29dc33d2816343c382783e5b5f38f345539bf5e02382758d5cce1016ba54f4bad5fc776869ca8ffe5947da2b18ee6
-
Filesize
99KB
MD569dc3477878012644c867f347f5ae679
SHA17b002e056d1cf59c339bf1d00cb146f92b740a51
SHA256b319c5f35dc446f73f92a1a533431f980147ded8d504cf8400cb6c5b756e44fa
SHA512a488a22bf87f8021234c575e9c91243d78b91a75f5b8d7810f7b93231d5ea9d573dad0623ca52dc1bfa38f7118809a846d868b8753a8fc75bc1a640849155a1c