Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
77s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2024, 07:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1PDDYUkFF87SLMn3pAU5h8KHlQvWwT0_S/view
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1PDDYUkFF87SLMn3pAU5h8KHlQvWwT0_S/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 9 drive.google.com 11 drive.google.com 12 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133749205267475331" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3688 chrome.exe 3688 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe Token: SeShutdownPrivilege 3688 chrome.exe Token: SeCreatePagefilePrivilege 3688 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe 3688 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3688 wrote to memory of 1840 3688 chrome.exe 84 PID 3688 wrote to memory of 1840 3688 chrome.exe 84 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 372 3688 chrome.exe 85 PID 3688 wrote to memory of 1996 3688 chrome.exe 86 PID 3688 wrote to memory of 1996 3688 chrome.exe 86 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87 PID 3688 wrote to memory of 1308 3688 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1PDDYUkFF87SLMn3pAU5h8KHlQvWwT0_S/view1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8d0cacc40,0x7ff8d0cacc4c,0x7ff8d0cacc582⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1812,i,13110774759476416004,6014668445572952102,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1808 /prefetch:22⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1948,i,13110774759476416004,6014668445572952102,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2552 /prefetch:32⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1904,i,13110774759476416004,6014668445572952102,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2560 /prefetch:82⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,13110774759476416004,6014668445572952102,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,13110774759476416004,6014668445572952102,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4460,i,13110774759476416004,6014668445572952102,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4332 /prefetch:12⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4896,i,13110774759476416004,6014668445572952102,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5016 /prefetch:82⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\0fa6392f-ccf6-4d45-9008-7da4e0149ce2.tmp
Filesize9KB
MD5b1985d65649550a80822a2b44d9baf47
SHA17be213a09193c200f3e982ecbc4d4e33f534ceab
SHA256e59137acfcc89b5f4793c5d7d943843215fedbbbee04de162975f481ba7979f5
SHA5128d25c8560f5dca08e2347346195c51e98287e6856d0283ab9a60a58a2b17572e8adffde4bd77e8b256df1895ea608d4b4446e7fecf5b0e61427f668291c2f224
-
Filesize
649B
MD58026bbbabffb25da98fdb28ac313d24f
SHA1d4594b5773877f2534536f30ad1d0ee63959419e
SHA25615c8e39a3f8be40405aeaf37d4877e9ae1a4f9811b70c55d229807044031ea58
SHA512983a5a654df8184310db9bb2deeeda1bba0fd8623287abfffd3e78fd30fc807589c3dc4762aeca84411589ffea0fbdfba662f08dacfa66e30cce8e91be46953c
-
Filesize
336B
MD5572c408671fcdc5b2e3fd1de80c95858
SHA12fe0e8eeaf0d0a94e41ff7098e47f794c4d466f2
SHA256dfef4ec91e1dabdb1c1711f5bb9f216d6e34b70f81e4f928fded1d70a7f4e9fd
SHA51284d1c13f13c90adb13674ff1b691d718bdf01b737001e10f67240b67bcc8ec98cc8120c519ce3a357ce3d3e838370e91231e83d509bb7325332faae4c8a6eb0c
-
Filesize
5KB
MD5964473692dc6dafcd1df10f2339feda5
SHA1c75d90bc2e1cf1df41c14d742c6e8577bb1c4752
SHA2560980814d5e920dbf31ad2ed3d4a6293a0fe9c3b62efc6415156b26f6a7ab9a96
SHA51249649e6e17eeba11f02d9e9d13e0fc1c7b2c8664f4fb9cce533fd6f34fbd48b121d8e5bc6e13f39a1032e099b884d895237a7d947d15b24af7f6df374407735e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5472a7b83610dfc95a91b45e80a141215
SHA1836c9038b16f4531c0f0b186c792201a69534cc1
SHA25605ffacd949419c96cfc001afdbf5b0e1698abd4e169d158b345a862dd5c4020c
SHA51249259002d2218f253654e0fdf50af1459adf808cad8b119feb1fe3ada855af12f845954a0faa79834f8b1d8a6ab80aa3be88d070ea6a69e1915497e7bd2f4ec8
-
Filesize
1KB
MD52a26b33298626c021febd8bd961a1031
SHA19629f4f404d11383aa6c8b3e8f2410562fb4cf74
SHA256731fec75591c459941bf33f1ec2d485e876537b50b75d64c4628ebd8144d1b41
SHA512a0c4f0586615d727f8788dd78b5b4e71b989a7bcd35737ddceaf2c287ab4e2f421d717391933a127d3f96f478cae738124aa4fb8c9b9e4ebef2cda0b15d97e74
-
Filesize
1KB
MD590fe7b3838d788797d692fd80ce2b6b6
SHA10bdd3eeb79ab04e7019fc5570877caa4f35dc593
SHA256ee60310d475cc65b268309c595292618847f35da6f56afc781faa1a186368b96
SHA51277b9377229f55efd7c31f2063a9d0463f73e4e607456e79ab6616ec46f311fa3d123f36751ca7097d3643f11e3e49c29ac210a1799483c157275986432d3161e
-
Filesize
9KB
MD51ddf681e806598537b3a43507c8449a9
SHA1395da76d547d4cfd726bf18ab6fdacbfe31e6f35
SHA25649d77a792ae5afbf28a68784d5c16f22bfeb87629adbd4677ecd776a93daf5ab
SHA5125ffc799ae1a92e02e42274f8a99874b3064b5dc1e2902c2fae14b17c4d9c1dac17af2e2adf3daaecc0ce7c4bfcbbecbf0be5376ff8f7f0ace82751847a696654
-
Filesize
9KB
MD5ac76cbb5386b63ec9205cb3e59c58175
SHA14481693e6ec2bca39afdb1051714bf2508969a9f
SHA256ad1ec5c5e72798c4f5c16fb63dbe0ab92e3c63cecddd21dd635efbcc211f78f0
SHA512e4d88c23c54dc9e6ff896fe8f3a287bf859e1b0baa93ebf6df04b105f3872f517b7657a66660975cc81554fd57b34264f1b0426f78f3a6838d4b9d8a17da18f8
-
Filesize
9KB
MD5ef21733d060c1045dc247eca69c5ab64
SHA1bb8817d32fa8377fed2ef00cf31bc88728fc1942
SHA256883efcd3bb5d071172682e303aeb30c71eecf58a3e8d6e462f4fec6389fd14f6
SHA5120d0b27265352870e7ea37f5f61e8ba6becb480c6d98d607626d7192ac5cd9f41191c95dba257d8044dc93a1933f6f15c80b0c69c72b862a8d905fdd8b6755372
-
Filesize
9KB
MD5f1cee01720a9c1912432de0fa96d08c0
SHA1807f94b6997f77a01bba9b5f9b8bcd9cc5dd99c3
SHA2561049275ac7f8b0a71acd022728ad30b262c17dd0e97190301538fcbace4186ca
SHA51249f1a7d22b9430084d7a41901a470ea15da238b5702416ddcdc86ba132efad6f1aef5071d2da8c97c9091cb9454f474d6759ff8070a02233048fd16b277d80c7
-
Filesize
116KB
MD5e08ddca9f68faf82bc55eff7806c5951
SHA1992dab5a4f1669866901d2b673c72a13405e663e
SHA2565afc6ea2c1e46921e73e8301b2743dd9171385564f4f797d50a79200743861fc
SHA512163d6796deef7ce69b6215071aae1095763a32d04f777b9cdf5d6e6f9c6b2a6b3ec5baab10597f3c6c34dc630113e808293b6845406940e4c233b53a169c01bd
-
Filesize
116KB
MD59b42ba8dd5e407dbeb1b50f3a3d1db0b
SHA1d879538b66ffd137704df57af1af21978afd2f88
SHA256a4b299c7885ebdfbe9a234a221787079f8fcd95be4926719e27ff65994247bd3
SHA512923fa3555f564b38f5fc0298867f45acf0a365f6ea1ba483820e6a6a0c832204adf243dbffc13bc9c58071a7442a89605d9ef6a912ae4a00d791aeca1756d368