Analysis
-
max time kernel
33s -
max time network
35s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
07-01-2025 05:04
Static task
static1
General
-
Target
Aimbot MTA.zip
-
Size
1.1MB
-
MD5
daa57cdeeab30823f89e5349b832a817
-
SHA1
feb679856d7a4a04d5e1a26e741dd6deb5ee0e88
-
SHA256
129c9712c6553669392a034fc14842a4045df98bb8abce95a6b74ecf9760a4de
-
SHA512
1403f94c54374a91e8d9e29b594b490ff49c16b4bd404148157e7b2a7eb57beced3459e612045433e3b4a0f78aca93d34fe2f4c198fc5669dee85c139273f376
-
SSDEEP
24576:3bPC4RI32t9KyRPCKNJrYjWj1JkpsnWvWjI7mBPJiOMSeFAPNuHWE:rKsIm3K8voCApsnBnFJirjSU2E
Malware Config
Extracted
quasar
1.4.1
Office04
azxq0ap.localto.net:3425
e51e2b65-e963-4051-9736-67d57ed46798
-
encryption_key
AEA258EF65BF1786F0F767C0BE2497ECC304C46F
-
install_name
WindowsUpdate.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
WindowsUpdate
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x0028000000046191-2.dat family_quasar behavioral1/memory/3376-5-0x00000000001C0000-0x0000000000516000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
pid Process 3376 Aimbot MTA.exe 2084 WindowsUpdate.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133806998916917009" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1384 schtasks.exe 3760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2332 chrome.exe 2332 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeRestorePrivilege 4860 7zFM.exe Token: 35 4860 7zFM.exe Token: SeSecurityPrivilege 4860 7zFM.exe Token: SeDebugPrivilege 3376 Aimbot MTA.exe Token: SeDebugPrivilege 2084 WindowsUpdate.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe Token: SeShutdownPrivilege 2332 chrome.exe Token: SeCreatePagefilePrivilege 2332 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 4860 7zFM.exe 4860 7zFM.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2084 WindowsUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2184 2332 chrome.exe 94 PID 2332 wrote to memory of 2184 2332 chrome.exe 94 PID 3376 wrote to memory of 1384 3376 Aimbot MTA.exe 95 PID 3376 wrote to memory of 1384 3376 Aimbot MTA.exe 95 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 3636 2332 chrome.exe 97 PID 2332 wrote to memory of 4056 2332 chrome.exe 98 PID 2332 wrote to memory of 4056 2332 chrome.exe 98 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 PID 2332 wrote to memory of 392 2332 chrome.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Aimbot MTA.zip"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4860
-
C:\Users\Admin\Desktop\Aimbot MTA.exe"C:\Users\Admin\Desktop\Aimbot MTA.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:1384
-
-
C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe"C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3760
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff9fa58cc40,0x7ff9fa58cc4c,0x7ff9fa58cc582⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1980,i,11505691695267532741,10806036820094698581,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=2000 /prefetch:22⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2180,i,11505691695267532741,10806036820094698581,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=2216 /prefetch:32⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2284,i,11505691695267532741,10806036820094698581,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=2400 /prefetch:82⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3144,i,11505691695267532741,10806036820094698581,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3160,i,11505691695267532741,10806036820094698581,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4512,i,11505691695267532741,10806036820094698581,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4524,i,11505691695267532741,10806036820094698581,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3696 /prefetch:12⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3136,i,11505691695267532741,10806036820094698581,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5056,i,11505691695267532741,10806036820094698581,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=5072 /prefetch:82⤵PID:3812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3300,i,11505691695267532741,10806036820094698581,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3288 /prefetch:82⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1032
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5add8d86c758e8daab7f3b1221a5edf0c
SHA168c117c7736d4feaf0f96f465bf874161ac858a1
SHA256ec32a24e4b168ac73706e0e84f5a56965c8fb534a9cb391b6dcd2855aba5db2a
SHA512b0f16d3a94c6ca21869da7374a14cf9e0f906f4fbf59f81f570f377eeba3f77bc641ea80b4d1a193aa684759ce4f92cd511fc01973faea7f46c18292d2895865
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD5e24b9aff72d8220db5b181251d999a4e
SHA10dbadc591808e8d623153dc99c0fafc12b8f2554
SHA256a9076f360cd99c79d291f00d374e492bfa742773a6ab82d13649c8258bf2b794
SHA5127b6d046eb840ca1ceae59a04da85dd15bf56e1ecef202b84b2a8d2f7173e102ef9e3084700520cbcb45bf378b81ea996572d373b194f9f15bed26e0c2775bcc2
-
Filesize
8KB
MD5be5cd6794224187ec717460d1a3e9e8f
SHA151d9ab10a9a00bb966e85fd43068a783c58a7364
SHA256e5bc054bf5f4848a44dad98d35ace39eb76e1a926e66ed5e3137a0f2a2337c2a
SHA5123d50af30285674265f013427d1c1babb9e2c9aa28b0bbf0fba22e17593ce6cbc3062032040f9506c771710a239f399f4b4c17260ae922521980bc6528a2a06cb
-
Filesize
12KB
MD57e568fb926b8c9cbe52165b7039fc4f8
SHA18c25c5a2656e4f3828f78eec457111cb48f9039f
SHA256b84522085fb416ac70ab2939632d21e9d516a6bccd8b510a6075cf6451680cdd
SHA5129dbb842d9b82809fe0351811a27d81bc9f5156773618b936acc75aa3fe62c06f4aa614cb2289b5be862333860dc1b36ee5233d18f3c506cde1c5ced8c1ad5414
-
Filesize
233KB
MD5c2f7bee1993848dc19a4f4c537a3be87
SHA103080422eea4024f5da21f6a5208e100f049dd98
SHA256b6ca3a3364791c901fe1338eebda6520c4011561e4afb81c24922e911ab9474f
SHA51216558e41016265606940bcc0dd84aaa4c1554674a9d16bf2d58050e712905c65c0038aa0efce5feba1ea78a1dec75837341b1726199ffeb86827d242dc473984
-
Filesize
3.3MB
MD5232fbce8fc20397039e7115d6736c5f4
SHA1ec3f9e41474a0e2597c5aec4be25158ccd2d4c68
SHA256f9a036faaf0d8069cad71070e3327f2b6318e7026338c32eb46dc23c18ab1291
SHA512b00d44a3fc0685b917a50008d66efd44c697692a7f02b2bc18f3c325642a8bb94d5966bd66d21fa045aa24d02a88600b3b66122e3a3f6309b3854f6820bc41de