Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
278s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 19:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://susybakaultraneggasupersaiyan5.unaux.com
Resource
win10v2004-20241007-en
General
-
Target
http://susybakaultraneggasupersaiyan5.unaux.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133734085161484187" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 628 chrome.exe 628 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe 2132 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 628 chrome.exe 628 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe Token: SeShutdownPrivilege 628 chrome.exe Token: SeCreatePagefilePrivilege 628 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe 628 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 628 wrote to memory of 3740 628 chrome.exe 86 PID 628 wrote to memory of 3740 628 chrome.exe 86 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 3304 628 chrome.exe 87 PID 628 wrote to memory of 5016 628 chrome.exe 88 PID 628 wrote to memory of 5016 628 chrome.exe 88 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89 PID 628 wrote to memory of 2040 628 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://susybakaultraneggasupersaiyan5.unaux.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8bd7dcc40,0x7ff8bd7dcc4c,0x7ff8bd7dcc582⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1884,i,13406285620020438425,17881133421956735652,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1876 /prefetch:22⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,13406285620020438425,17881133421956735652,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:32⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,13406285620020438425,17881133421956735652,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2368 /prefetch:82⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3028,i,13406285620020438425,17881133421956735652,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3064 /prefetch:12⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3032,i,13406285620020438425,17881133421956735652,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4316,i,13406285620020438425,17881133421956735652,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4624 /prefetch:82⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4752,i,13406285620020438425,17881133421956735652,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD52cf3e9133196e80f2574724b1137517a
SHA1e6518337f601b3beecb881c5315f88093e1e8e17
SHA256ad222be55ab748201c8514756d18a89ecf2a9bcf93d013b3a581e016bbb129dd
SHA5125b93469f88adadf0ce1225c04456ea90fac76f30900ae06b3c14869e544cc239a7e4da3fea489b5bcb655a9cb8b4434c486a87f75ec540c38446fdd2515cc276
-
Filesize
120B
MD551771a947bceceeb5b01a5fd1deff6c0
SHA15513b439a915f9b960948066c7844337fbeb6bb2
SHA256d08caa09cce6500495124074ac1778815ab59e0f1a12150f69a93a033eecbd04
SHA51211a909b5ef99b6e4b88cc741370b43c003d8512d117a551b2a88b22aa69e3bab7186888bb95e490a6d8cc69e3e2e85b495c1cbb207cfb4efbb6bf59d1c892197
-
Filesize
2KB
MD5624f2ab2dc681263c33c739284ad1a84
SHA113f227e5cfc52ce8206305753b63dea45606ae08
SHA2564c63e4ec71b72926eb23f2da4f600d76f596310dd5ddd8096fddae52ce3be1b2
SHA5128f2d523fa6533981150bbd4adc21ed216dd1df0fee19faabeb962c07533582b6324af353bae7eed03571ba205843965d8f89e6d3c14853f7fa33d67b2457c9d5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5a50d8d25ae16817358e3353f34b8847f
SHA1678608edc62a3cb4229f9bc9a7d3fa4eaf722681
SHA256c1f04ccf9e7b60f96233fcd2fb6bdda0240566c1464fea725a9cc97063d4c72f
SHA5129979a635ca20137e1fad0d37b9344a69a2079779f8351c3bf830e562bfac20e44795813fab7fa9b882a73ee053d5ef237d3446ad77ee26d9b8695ae2ab6546dd
-
Filesize
9KB
MD51b12fc62ae969cd3abd603475c87c9ee
SHA1a5e1c0cbd8773450a97f007706de23cc843d3eeb
SHA25607883051490c5450ec8e3ff9ad463211f6a2102f8bb08dd8b1aacd0864d58bf8
SHA512a89bccac86f7f3d92a08a14c6e8feb499f5ea9a853ea10445c3f7c5e774d2c75fe8d25a19b23e476a209a104107cae84ed27466c22cb1d0667da2dddb19c1f65
-
Filesize
9KB
MD58b00ed4648a495fd9cad43478cacc4d6
SHA1435aa178e5cd06dc47da0be286bfa7f073a9ddb2
SHA256b26c246afc780dad36ec95bf6b472691eae03411ebfe97fee3f4f31338e2636c
SHA512afa8b46a187bff2dbabdb54eb77daec1e6dee9780b9beb4761423d8900cbca5221e2103a8605deb87392ad0fd98e5c92006f11cf2a24e14f3270d25e994ff26a
-
Filesize
9KB
MD55272c11dabce2ab802510e2e17bb7100
SHA1b7b75cdf3339f26604804ba31f8c002374da6852
SHA256279fbc905dd446163595312fa2c871ba395f14727f9427cd9cc2202d8272f84d
SHA512bef56a01a691fd8da8f5a5123b95dfe0d0948fd30cfa09ddeeb421418e977b54bac7f6e6acc4f783fae160294053025d8c4bc1f1aeaa84196ea7898827cd242d
-
Filesize
9KB
MD548a99e802452102ace63a19bd0cf169b
SHA1012667164351d40944b86093ad1fb614205c5050
SHA256cc4aa86865cfce9634faa2b9e0c85f4a6f5b682bfe220b00e0e42dfe575b1589
SHA512efb912d3fe5eb2364cdc288133eff4ef913a1210cfd6fbf58c03a8cdc99d79cac1cdcbd033e0de355be265c5fa8eff6e6dc3a271456187f07ce6ff81a73231d5
-
Filesize
9KB
MD5150eb0bd10ab79fa4b5e5296e3b1754f
SHA1abdd0206db93f563ff0b6c89a02b0371b4219b20
SHA25610b756246448fa5036516f1954359885e95dec9775c217557ce29a975ae1db6c
SHA5124ba6a50052b825b9dc08a51d65c35bfd83736eb62076f47f329e9feb32e397d2564ca1f4b1545589a7d0747786849eecc57e52d62c59ab9f9eb1205fbc248846
-
Filesize
9KB
MD50bd3c7a791b5625721d6b9ed44af15cd
SHA1fa21e1212830318e1725fda113bd3e6ff8840cb8
SHA256ffce2894dbf0db6eb201bb61c8af9e16fc37cceb10982a20054a7f0f74ac01e9
SHA5127f8dd5ca41da95f52624cd44d2a597fbfdbcc47fe684ebba08008928d697a905a8a3e678d99a10ac1702b436d57a01351a2f58ebbd29ee931470b823aeea9f64
-
Filesize
9KB
MD50f57d325375d8fa41078b7f69e306332
SHA147a03e876e3ee5974223a31002183033bd7cf6a1
SHA2567173a37aa6278bd0bd240d7e7b790faad2475b89b143d61db49ce8523d07d87b
SHA5120f238ef5b426e9c86b513af31a632e0c5088174c29b2e3c9219566d1a5eb555887375ef8a8c63495cbc33a3361761b895a133e0f0ba2ab8ba148277009debb3c
-
Filesize
9KB
MD5c984d47b99703c41fcf315e956ebd4a0
SHA1cd89cc49dbe80cc7a79cb8324f6bf50ae085bf47
SHA2568ff94b9907a981bdc6603717aa1d703a402cec7994cc43ec9181f8f5b6f9de86
SHA512794f7efa3389a93e1fad1fa49399aac6724bda38c2524298fd1f12fd1100c343dddf4e17ff7edd9f8ecd3d67dc3fc8669d13859de45d68588841070a2c461587
-
Filesize
116KB
MD5c4137b485df9f765aa4c11477b93df12
SHA1a9ecd0956a83ea72943c7d1f353bb4084fc770a8
SHA256bd662631cbd3c6f5d27abeba331d0f3407e5baf8a5afdd5ff3285a7895ffca3f
SHA51249936667c83936ccced14f12aa40cf1cbc36b5f71b77ed5a39c2f06b88fbdc26c01cc61b86a9ae43aed6a1cc98b0da00dc640f1cad0538ea88e27bba05b1bf8e
-
Filesize
116KB
MD5eb09345866c3855332d84616375a7f5b
SHA1fdcdb1b331f05ad06b7985a03f255bf7c346fced
SHA2569b1e56cfa55de38971b84714838363dde788c86e9af650fc69a7c70467d20077
SHA5129344a086f79d6dbcd4bb9a9373b8cbe8dfcc06ee56c2834bc4339e53741f5d05f0a0adef930a5f1df6206d0b8a33a3f2bb903340c33f48326fc92effcbce797a