Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
116s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 08:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.icai.org/post/list-of-members
Resource
win10v2004-20240802-en
General
-
Target
https://www.icai.org/post/list-of-members
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133705186900781244" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4924 wrote to memory of 3136 4924 chrome.exe 82 PID 4924 wrote to memory of 3136 4924 chrome.exe 82 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 2460 4924 chrome.exe 83 PID 4924 wrote to memory of 4992 4924 chrome.exe 84 PID 4924 wrote to memory of 4992 4924 chrome.exe 84 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85 PID 4924 wrote to memory of 2888 4924 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.icai.org/post/list-of-members1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd2ffccc40,0x7ffd2ffccc4c,0x7ffd2ffccc582⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2024,i,774400949210083073,494218839975603763,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1872,i,774400949210083073,494218839975603763,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2428 /prefetch:32⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2148,i,774400949210083073,494218839975603763,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2564 /prefetch:82⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,774400949210083073,494218839975603763,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,774400949210083073,494218839975603763,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4616,i,774400949210083073,494218839975603763,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4628 /prefetch:82⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4624,i,774400949210083073,494218839975603763,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5f3e2f001a78efa2a0b7da0a6c6a012b0
SHA16c7ab9755c395d0d2768d6dbdf38d6372493d91b
SHA25628c8794e55e20ad982f2e1942dafabf956960b9284d15b675f0d981fb89f8d64
SHA512e44bf9c2fdaad25e34823c2766d1e488832050169a595c702a9faf16feac20933baf1a9be4e35a48cbc8f5f5613ef95bac7177d17ed6e151c7a515d5901e72c4
-
Filesize
144B
MD5a373a524e46bf7d6bda628c35ad33cfa
SHA13ad9211f5d14b9d22650d685990043bb7a150b66
SHA25678a1f9adb9d379d34dcc7066c4d3c39b7e8b129d5a719ecade547d6482135e78
SHA51212d308b9982671772eae5b59028fae785357040e775a6d72371139da91d56fe3c07a291fc8bc7b9ab2f55723937135cbac6e5ebc99615efe1f4baacde9ab2266
-
Filesize
2KB
MD508c8c4462718255b1b66fa72e9a5341f
SHA104315e1c4e18e99c4de3d3054b5fb7728479ae9c
SHA25641bf45436db792c1a676ecfed59b0105ab07dd8248cb650afcaac7bcdba29713
SHA512c2f08f09357ceb7c26e5a4536f6137b19af279b5265789657eca31efe7083a873c9a705b22cee5ccdee2981e35bda963db7155d3f54737b5af63e9a4025cf34d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD5cddc1ba1336aa0caa684dcdfaf5bed85
SHA151668fee28aec6d494c5924354ec89f71011b754
SHA2567c2ab65f4699ee87c1f2c15c8032d17c6c455cfe5bc74c327b451e9c4b87bd89
SHA512c42a4a8acd2df2142cf9eeec6ba72d163295059aa5ef44aad26af2c1f1df5c09edaa5496f1beb62d3f9766f8d892c63a9f75cec073bc52404b1a90ab77adb1fe
-
Filesize
10KB
MD5e654ead8ae722496cba53f7e70c892b7
SHA172c07e266d51a8bba179a574c43258c08912a5ff
SHA256cdf390377b6aad3f4608ab1643a56018a9e4644164f7020ffaf5d3f0135ecec9
SHA5121e635a782960fbcf472c0877e5ef3802d82949e9931c5644cba97c4ab9d21f44fcc3680abecd1e73e37143dc37f5b81d77f386166b41bde1747416a27d343dd8
-
Filesize
10KB
MD579e1e8f18142beca5660ff299c6899cb
SHA1ad66c207da6d19f6d4c4470da3d0e7e4b5b4c268
SHA256dd38a3344e18d3623082651b4d6f4efc74fb7809a988b4fa960cc7afc79395ce
SHA512cb6c8c1c2757503e4ad2b8b2ec2369970d913d4f7ccb51c37efa831032469aeb571428c9a101e16df82c5bb0eb1d4d8f6be238900c0da1ef1dac3657a9f2439e
-
Filesize
10KB
MD50dc284761bdb671abf4e8145eaad4b39
SHA1b0ee64495be04596974e86268f43cb762e910a16
SHA2565a4a01167bbd4f8d5980de22c23be510ca9c0008f1d307cd3d169030f2beea3d
SHA51287f17219897dd70a4c475d38c74aa614f30ff3438670d0c5399c30b95e5d6b42fc7c2bd91d414ce2109e1095eb54c5c1e13d75cac1e90e5871ee4d4aa889b5a9
-
Filesize
9KB
MD5ac79d161cf1f5d69b9a12fb1be0253d7
SHA1e42a6c23e1707bfa076f338e639eeb26f80245e3
SHA2560803d62be8671be9fe1a239bd88ff255792b29aa682124ffc76391516e0a1a15
SHA51238a7071a1b19695aed60cfb43b4d7db90cec78b6482e8c45aa5d564e19463d6894e149ebb8e1ce35008efe6c085505ff245c19c986d77cfa897cd1ae0ddf1f60
-
Filesize
9KB
MD567bc6b1d452c8d8d4c185e44e889e864
SHA1db93218390fdb88913e2025696163128b3244ff0
SHA2560a8fd8a97b12ff41607a5694b8111c4c4949e80f3157e338bc7c40c7cc4d0d52
SHA51292b848c76e5b31731ff0fa4f9661638617e0a8b3b071e03a085640b8137caa252365909671e85558a3fb8c3654393532ee797021228f650659d955a8b126b9e8
-
Filesize
10KB
MD569fba07f43b9ec2c1b6918dbb3f70dc4
SHA16544ea7049330e22bc8143a8273d192b2eebfa54
SHA2568944a00da874b1a5e3cca59dd02fcb976fd2fff18c3ad6b68097d65d94c57b7f
SHA5126522b732e66422b74020a4a729af76d4465fae56575ae32f14d9dfe2e6832a61ca980db79d6d81ad5d3ac6d67995f68acc546085be63416faba8d8fa9daae083
-
Filesize
10KB
MD5bebc0b8ad2d09b8b46f176845f2a9ae4
SHA1e06cd571713025027e193ba85a540a8f817d5e1a
SHA256d3824cf5bd0f848c2e3abc88eb345667f5ba9b100fea8dd2e51bd6e9f714dff1
SHA512bf5f63ee8bc0bfb3abe6cbdd4c464dadf5057a2a56ec03bb556d59236a411ed712181fd0022c63fbe1f6576533a99b57b554f5bcaa2cc5f8bf5fdc799cb2e599
-
Filesize
10KB
MD50500ad2e4abad68fc56810e7bacb2b3e
SHA15811eba38c7f041653f0871cfc3d4a25435cff1d
SHA25670c67acb8627daab97378e6cc34599057b839fc57101d0fffcdcdaeb19552d9b
SHA5121ff138d83eeb12b28dfa172802c0986fc9b511228bfc48c31bd7f26e824c2390fae8a73fb6f7cad189a8bc57387b65714146703700b49b0f8e5e8b04409d2e62
-
Filesize
99KB
MD59ec9cc591c3f8aba8947f7c4a992a29a
SHA1de5e319bee99c228cdf6b5af1a74ba29f1402bd5
SHA256bc99d44fe6bb01cbbcdf92afbbd91835e47b4198a87522d6a4b8d4beb4754be5
SHA51291ab2c7ece138390e48f8a684d3bfee5e6710a60008e501a5fa1e45dd6f4ac6394abeda8d8e524e314a78eae7d1fce784febe512ab1fe02afe62490b666c4b80
-
Filesize
99KB
MD5f5e303da803ba8c4d95b4df95db88962
SHA1dc9bef76cbc7cc1291e1712d8c41268884e57467
SHA25639f648ed45a6e0bb20b1a16736b644a6d900b21254252dc94bbb0e817beccd55
SHA5126a7d5bc34f8e58f2322c5e5206fb190c576bc240e84ffcb1e907a4ed73a927f3e87a295eccc439ca58a2c22e77b2cc3f9b56626c89a6aa13e54ffeb2d87b7d74