Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
17/11/2024, 01:12
241117-bk12esxhnp 317/11/2024, 01:12
241117-bkpy6axhmq 317/11/2024, 01:09
241117-bhytaaxjhw 3Analysis
-
max time kernel
45s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/11/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
Nitro-Generator-main/main.py
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Nitro-Generator-main/main.py
Resource
win10v2004-20241007-en
General
-
Target
Nitro-Generator-main/main.py
-
Size
4KB
-
MD5
8c8f80556986328020c86044a15e93db
-
SHA1
1e72ca40206bdaa31581ca5186d09c2f795e4d56
-
SHA256
09f995dee3be7bd181a66cb21d4799c39c38930cb7d8be95d7257399302a5b72
-
SHA512
6ef16bb2055c5d461e12597a6cbe3ca30e5ce06057864d82e6b9523972d704c717af67097b40049605575a66e3409c6b9f652c45ba72423a87e69218a2e7b21b
-
SSDEEP
96:PsF1/TnTpxTRoCQfHGCp2i/1covRmw2CihmhZM2OIm2WiZkyQvqu6Xy/Zr:cTnTpxT2CQfJHGovbpih0Z9OIm2WiSyA
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2676 chrome.exe 2676 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2624 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe Token: SeShutdownPrivilege 2676 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe 2676 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2624 2460 cmd.exe 32 PID 2460 wrote to memory of 2624 2460 cmd.exe 32 PID 2460 wrote to memory of 2624 2460 cmd.exe 32 PID 2676 wrote to memory of 2208 2676 chrome.exe 34 PID 2676 wrote to memory of 2208 2676 chrome.exe 34 PID 2676 wrote to memory of 2208 2676 chrome.exe 34 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 2568 2676 chrome.exe 36 PID 2676 wrote to memory of 3036 2676 chrome.exe 37 PID 2676 wrote to memory of 3036 2676 chrome.exe 37 PID 2676 wrote to memory of 3036 2676 chrome.exe 37 PID 2676 wrote to memory of 1664 2676 chrome.exe 38 PID 2676 wrote to memory of 1664 2676 chrome.exe 38 PID 2676 wrote to memory of 1664 2676 chrome.exe 38 PID 2676 wrote to memory of 1664 2676 chrome.exe 38 PID 2676 wrote to memory of 1664 2676 chrome.exe 38 PID 2676 wrote to memory of 1664 2676 chrome.exe 38 PID 2676 wrote to memory of 1664 2676 chrome.exe 38 PID 2676 wrote to memory of 1664 2676 chrome.exe 38 PID 2676 wrote to memory of 1664 2676 chrome.exe 38 PID 2676 wrote to memory of 1664 2676 chrome.exe 38 PID 2676 wrote to memory of 1664 2676 chrome.exe 38 PID 2676 wrote to memory of 1664 2676 chrome.exe 38 PID 2676 wrote to memory of 1664 2676 chrome.exe 38 PID 2676 wrote to memory of 1664 2676 chrome.exe 38 PID 2676 wrote to memory of 1664 2676 chrome.exe 38 PID 2676 wrote to memory of 1664 2676 chrome.exe 38
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Nitro-Generator-main\main.py1⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Nitro-Generator-main\main.py2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7239758,0x7fef7239768,0x7fef72397782⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=284 --field-trial-handle=1376,i,18314035679809436603,18289748303941951077,131072 /prefetch:22⤵PID:2568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1056 --field-trial-handle=1376,i,18314035679809436603,18289748303941951077,131072 /prefetch:82⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1652 --field-trial-handle=1376,i,18314035679809436603,18289748303941951077,131072 /prefetch:82⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1376,i,18314035679809436603,18289748303941951077,131072 /prefetch:12⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2280 --field-trial-handle=1376,i,18314035679809436603,18289748303941951077,131072 /prefetch:12⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=284 --field-trial-handle=1376,i,18314035679809436603,18289748303941951077,131072 /prefetch:22⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3212 --field-trial-handle=1376,i,18314035679809436603,18289748303941951077,131072 /prefetch:12⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3480 --field-trial-handle=1376,i,18314035679809436603,18289748303941951077,131072 /prefetch:12⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 --field-trial-handle=1376,i,18314035679809436603,18289748303941951077,131072 /prefetch:82⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 --field-trial-handle=1376,i,18314035679809436603,18289748303941951077,131072 /prefetch:82⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 --field-trial-handle=1376,i,18314035679809436603,18289748303941951077,131072 /prefetch:82⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215KB
MD5e579aca9a74ae76669750d8879e16bf3
SHA10b8f462b46ec2b2dbaa728bea79d611411bae752
SHA2566e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf
SHA512df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5ec5fbd0a83613daff05ba3b4363586b2
SHA1129af574f4fc31aa0c2a7d6530da6d938254e641
SHA2561c7865767757b61973012dfa1a1035c3617793f83b38d0a3ce1e4ffbaad9e117
SHA5125cfde599bf76a3001001e2c403983b30198488d44d20756b42ecf75fdd068684a246a8d8bd88340da6168f0b85d7a2f9b1a7fbfb80ccd1011caf693e2ca8aca3
-
Filesize
6KB
MD5cb68126b26d31522077ca7cbbe86e63f
SHA143b06c47364c7f5f4804548e2a85d8eda39b5843
SHA256a3797e2f190070aa85100d4a1bd6a2a43a6262c43ff9eda7caba143cb22f7456
SHA512086395cd18c8ce239f833cc2969c0306feba37795de07d1bb0365b14400f3fa1685f8345df04409f4c14a540fb2f2429e000a6e40b37bac5ec309ea4c93d3a00
-
Filesize
5KB
MD5c1d7fd7f9e76c015c1761ba7fb1619ed
SHA119a7fb4d09f3537c304d9cc107a9aa345f20854a
SHA256d0e39253a73f02df1140050200420b035885f642ee72f053c11d7ae56dd73229
SHA512d267c468e05d15c70ad408f7f808580edd4333cca61830f10b432194729c7c22bd83113eac01badefe1f9031823da47de0d6d30de99b8fb6a94bf2081767236e
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
170KB
MD5759daf1ad802f74d143bb6899267ebfc
SHA1930beb7d28d9d2d74aa0c6e84e8ace357fe6f254
SHA256351c2cc82124e0da1b67167b19e83ce6b123318bf9a02acac0abb55931a18730
SHA512cfaacf323b0b5e02fa819363533733353dfc8504d004cc0c6d9eab0a0be8f54b3dbdbb12d18fc0e909ae3392415bee9369e9211e1cca599c7a94dc4da8d639e4
-
Filesize
382KB
MD559280011569ce50f24778932860fc3aa
SHA1c05e9e9b1bfbefd4dc47bbc5c1c2f911c6afef38
SHA256111923310d54365771f6102b6b67111259263897cbc4a08092c6f55cf82ac744
SHA512f094b8a50a19f633c58aa2bb6ca20103b1672a022ccdc0923757f873e499a335ed09e3fab070753a71396a93482fc906a6f2e1475f4968243ffd173367f99c2f
-
Filesize
348KB
MD58ea13ee969a4c2ab315094193c95c362
SHA1bf532b49774e3687e5708c240d6fc4ad6b05bd04
SHA25686907dacd6587133a9a90dc018fd452407c35af0ecc736aa73e7eb7ef3d27ad6
SHA512ffbda5d297c3770daf277c510269c48056d0d61723994c05d1811a1123ff4d88bfe2261c8e68661cad612092d735844edf9fc93260099de6bb5a1cb67ee7f924