Analysis
-
max time kernel
68s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 08:13
Behavioral task
behavioral1
Sample
anydesk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
anydesk.exe
Resource
win10v2004-20241007-en
General
-
Target
anydesk.exe
-
Size
9.5MB
-
MD5
4943aa37911a76d77390059b6b2f8704
-
SHA1
12070bf6a7785bd393e679b31e32063329c0f939
-
SHA256
4d37269d55928ea2bb9f3cf1418ce83dd7a503ae727fa7d8ce6b2cbfb838d674
-
SHA512
4065969cbf0c2156b91dc03f24442200ef514219957504a02d7a94644c9f32690f23404ce485b682dda67a7417ccb459b0bee36c5843751387437ec09bd6fda1
-
SSDEEP
98304:tOztpWZf9b7yyJ+e/RsgqAN9wTkOEgV7FB21Qui5ja:ADuf99D+gqANqTkrgQXi5ja
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2972 chrome.exe 2972 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe Token: SeShutdownPrivilege 2972 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe 2972 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2972 wrote to memory of 3024 2972 chrome.exe 31 PID 2972 wrote to memory of 3024 2972 chrome.exe 31 PID 2972 wrote to memory of 3024 2972 chrome.exe 31 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2868 2972 chrome.exe 34 PID 2972 wrote to memory of 2800 2972 chrome.exe 35 PID 2972 wrote to memory of 2800 2972 chrome.exe 35 PID 2972 wrote to memory of 2800 2972 chrome.exe 35 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36 PID 2972 wrote to memory of 2604 2972 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\anydesk.exe"C:\Users\Admin\AppData\Local\Temp\anydesk.exe"1⤵PID:2376
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6e79758,0x7fef6e79768,0x7fef6e797782⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1228,i,18356541297447311361,7099747975678088966,131072 /prefetch:22⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1228,i,18356541297447311361,7099747975678088966,131072 /prefetch:82⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1448 --field-trial-handle=1228,i,18356541297447311361,7099747975678088966,131072 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2272 --field-trial-handle=1228,i,18356541297447311361,7099747975678088966,131072 /prefetch:12⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2288 --field-trial-handle=1228,i,18356541297447311361,7099747975678088966,131072 /prefetch:12⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1104 --field-trial-handle=1228,i,18356541297447311361,7099747975678088966,131072 /prefetch:22⤵PID:576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1312 --field-trial-handle=1228,i,18356541297447311361,7099747975678088966,131072 /prefetch:12⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3736 --field-trial-handle=1228,i,18356541297447311361,7099747975678088966,131072 /prefetch:82⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3808 --field-trial-handle=1228,i,18356541297447311361,7099747975678088966,131072 /prefetch:12⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
Filesize
168B
MD523fc969a370e0474827f94c8830dd61f
SHA1dc467a42ff382e94baac68a37f3977d22ce31e6c
SHA2562770e097b063aae0fbfc8a124a6170468674349be82ea2c171cfe153b272d4b1
SHA51226bba25b2c70f8d05793ad6cb805831e39a027d5c64440b2a3cc3f86de7fd5cd02f2e978255d282e7169f385ac6d8756bbd5d8cf0db18fb92da0076ce11025b1
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD54dffb9ee0b7763d314620a548affc633
SHA1c4ab3f171963f39c21107858012e3d3847f8ee9f
SHA256bea7df28562d31cc9ca0b032dff7bb79eb0334d9e9e77a5a8a1031ea8ead5414
SHA512d2bd484d772d93adf4bbc369a441d43ff83fa33c5129592444461d5b05584b76d3499617853f8cfd089751cd4ee4a722df85cef0f104e8103b40c09d0f7b2519
-
Filesize
363B
MD51a55d6d0270e36c713c94ca6ea97a8fa
SHA18f210199f2636ea0896df842334a4c09157b398b
SHA256902b61bd113a29d3b11456a07ab04eb50470232804a12415037ae03d6dd75e5c
SHA5123cedb3a0b04f6947650203fe3391589235f9528c12c052c62e18fcc59cc5b130873c3f631a9e368c16940c2203fcc0cfcdc3e6a400083eb87040e3ee73f50f5d
-
Filesize
5KB
MD5c439088258f5fa9e48e96025127a592b
SHA1bb4305cd8f789bcefde6d510d40eed2e10d42510
SHA256bd1fb3b9887dbeb6be62bab804a5cbf9e3f30dd1c3e1268efacd5c5024f35d2e
SHA5121c5ee23985b284bfd2cccd95c60f5bbac59df8a07cdf4b8c96a096784e8f881b405209af38f482e6221f209f52b13065d8bad06d83019eb7d3d7f12bd68d2190
-
Filesize
6KB
MD55a6dce76d4e4cad1e37e17f79e080eea
SHA1a2e4e75029f874afb1918063f61b9f76f182e98a
SHA256e26942bae3939b69587fccfbdcba0b4ebf37c3253f9eda8d9f26b51a50f869f0
SHA512fe8510a4a0e348b3a84f449596d1c201b0c261f44b53375918a8344d8bb2c99fb043dbcf8d0287d70c0e1ecf9dd5ff0112b3a34b293a5b61ffc075336c33d89d
-
Filesize
5KB
MD580f92a5e1de68649fd1a66305424e009
SHA11f83a6292bc50aa66cb2d6bbdfd764ee6e585069
SHA256e609e52a807d275fe49d5fc3e46b7282306759c3c3ed52404a3785967ac8de02
SHA512b6ab381e12a58ddd0298a9bd97ade5b7f11935ff3d2cf53b3036c04c06f7d37ecbe354d628f482c12556d3c4a16211b70f5e9b8f2e2d223094925f27cd408637
-
Filesize
6KB
MD5d5dc3f7b2cbb54b6aad85589069158b8
SHA1258011e89f9866204fcb833699086564c8eb5eca
SHA256de28729c129edd2e9b1a9fa6bab89e62481ab159f75d9db25c686fb32a5c9f1a
SHA512c36eea6c775f38129b56c24586d067419d27bcb3f830e37a28d3ff3c0c059fb95064fa396e081ab7819d18be183c39e931b1f443e3f5a4eb2bb69f698e28962e
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
344KB
MD5958858ffb18fb40c3325755fbd59dbe3
SHA1f5ae4b4544d385749bf5bf200df85d8892c3ea44
SHA25619f7fd1ae6a642ce209af8f045ec88f4f10771be2acccdddf2c270f5dcc4d20d
SHA512fcb3bb8a8b957aec93400958aa1da1eff59ed7dea0ae9d148ec278b40ff92c99037c6c7765e2ac2b091f82f7fff73421d3b759dd564fb22c4525f1c7301be853
-
Filesize
344KB
MD5118d64213a28905ea85fb60d49ee1bc9
SHA1e68c06aecc19aa04f72ab1d3c6ac0c4fd31b5a82
SHA2561c049857eda140ab734ccd8c2070bb8207cea340f1118a94bf8b83bfff48b20f
SHA5128ed79db39c1b19566b1d62f14574708a08759713c22645d0c415987a25ff22699779f826aa17c8daacb7ad4d5003d39756a8b6170f969f6f630168ff9abba39a