Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/01/2025, 19:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://stenmcommunty.com/activation/id=1561523058
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
https://stenmcommunty.com/activation/id=1561523058
Resource
win10v2004-20241007-en
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133818757042711265" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4752 chrome.exe 4752 chrome.exe 1564 chrome.exe 1564 chrome.exe 1564 chrome.exe 1564 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe Token: SeShutdownPrivilege 4752 chrome.exe Token: SeCreatePagefilePrivilege 4752 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe 4752 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4752 wrote to memory of 1768 4752 chrome.exe 83 PID 4752 wrote to memory of 1768 4752 chrome.exe 83 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 1776 4752 chrome.exe 84 PID 4752 wrote to memory of 4024 4752 chrome.exe 85 PID 4752 wrote to memory of 4024 4752 chrome.exe 85 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86 PID 4752 wrote to memory of 2124 4752 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://stenmcommunty.com/activation/id=15615230581⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9a4b8cc40,0x7ff9a4b8cc4c,0x7ff9a4b8cc582⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1812,i,2053021056541354313,8358262338939285380,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1808 /prefetch:22⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,2053021056541354313,8358262338939285380,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2200 /prefetch:32⤵PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,2053021056541354313,8358262338939285380,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2580 /prefetch:82⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,2053021056541354313,8358262338939285380,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,2053021056541354313,8358262338939285380,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3848,i,2053021056541354313,8358262338939285380,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4484 /prefetch:12⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4844,i,2053021056541354313,8358262338939285380,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4860 /prefetch:82⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4120,i,2053021056541354313,8358262338939285380,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5bc9d67f65134630810953fd4abf5dcec
SHA1946832496894e56a92559aeaa07ed755e1a26d93
SHA2562e69f5310169056ed536d8cb6887e2de26a615180eda9026ca4ded4f27dd297e
SHA51259cbc0fd3356ccfaa8d04f410407758e75bcff6e8825344fda282d5cc6dde95147e3b562c63c39c0fc107c38e862c8029b919480597a246e8ba0f5dbb2adbcec
-
Filesize
480B
MD5e3ec23400c020e4d07f95273842a94c4
SHA136d7b8c5bd9202d43a3b569c57800d5c64f1c55b
SHA256c159d7970afeb0b9f1f094e360c49e133d6215d684a3c708d84e1cb3a5fc6ab0
SHA5123224cb0906bcab970f4e63718028b9d827d037b837d2719d737b0d94ff00179598e69df469df1ad7f00bdb73e9e32d33312753522958a537e01c9615aa9fc5ef
-
Filesize
3KB
MD5571ba7e561ebe1ac3a9536558870564a
SHA1f5a70261677ab04f57c3dd5f257e9446b200bf6c
SHA256171290e3d431c51c80ffecbde24a8e09d32c1abdc26d4cf1850424a029532760
SHA51241c27a9b29783624577d2936678a921ed14f9418ac600f169589278d175799202826bed043a84e9776b5596098442a9c3a5f2409a7e91376c795d522544dce76
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5ccab79f7d1c15dcbaf3fae9b9f1798f5
SHA1e0a26f033484aade3793493bf5d7173344c81aef
SHA256f366855833b47d64f7a892150352aed10c116649b606539fa823a0092a116d6e
SHA512e0a7c1f176146c1b164325591c575eecf9758d9ac18d3fcea4155461c7194c1413117322fd4ecee37caa3d6c9b39310e13a53eb69225acab77c8cc6f631ab08c
-
Filesize
9KB
MD517fa51304f5fae1754dbbcb8e718278a
SHA17e8a94a9b5bc9e1cfdb145fbb2d6dc7624c5301e
SHA2568cb918f6c17c39925a17a7eb01eff45713d9228280908e05c5f238d06f103067
SHA512f7eac50ac2b076dfcdc79d7b892f983a1ec88c3084f7ebd33a3c5811cbcd29722a198a2f6f426da171007d58b4e72b3b6bc65cba5ed9f687496b58133adaf4e4
-
Filesize
9KB
MD5865b6d173bb65d9e9d2aa090c6d57fac
SHA15b81fcd93f37c4383a19ac921ada1178a148ea97
SHA2565b85552631af814866443fe573cd06e9cf3c9143646ef25e14e663613ab3ce2a
SHA5127e465909eb478998f7b98d71a5b38ce66f7e6a5d10d48ae7aad61b303e39143a0d04d159aee3620911840f059979b78b139864f650cc66a831b34e591f2ee189
-
Filesize
9KB
MD5008184f8c42312dfc0e858e8d9525eeb
SHA1245479afbea9fcba04b42ce25b6ba819b6584207
SHA256d5b574775ded484a6b946af6d383652050141bff4e44afef2db8a011fbf0468d
SHA512ed22c56d74b809009515d63305bbcb8ed3f1d355ede60c1590c3a342d26a36c7336a76d61416bd0459f80fcb028556b2f93f1783fb76d18c884919d88af76dbb
-
Filesize
9KB
MD5b4dc2157104f594a25ace439bc21fb68
SHA16180952366450af6e1e99613bf89ff329af03c48
SHA2564f19de24a45484c80f87458d60ec56fea5a99284118e3eac523fc58e97947a59
SHA512c00baac182b82aa564bf737902a882c3312333f716a495c427c9c4f583823f3b96d4b0894cb42345c563de03b89486cd12aa1c60cc8e419bc2437e41fea203ad
-
Filesize
9KB
MD54235c131f44b5c29b0e3dd94da36e885
SHA1d675cbd1c965dee675087972f459847f869d24ef
SHA256ca7a643279186969b9c867db388c9a7b872e5e014fe2e783e83f354bb197bd06
SHA512027542a0528ecec84776a115e749ea69241d9f714361e5c1d9b6e5391ba6d20282d092db110b608e66503d2a94b74720df221d074c3e653cdfabaf6d3534e00e
-
Filesize
9KB
MD5044bd23f357ca4bdcb382c5cde25dc9c
SHA12cb40e0629815d9f2a199791e90fccb6f8b8ca9b
SHA256abdc75c6d6fa877ce9508613684661964a470ffe66c802c68d7e4594058fe637
SHA5122c500065d554bd97fbbe8502a72f65e9bd81abea314d1c35874c258af6a2a25d0fcbcf4779f568bec1a5b8b94d4636e29c38ce44d06e8fddb837f479301ae1eb
-
Filesize
116KB
MD53221c90bcbd7855d2b7675a810e1ecda
SHA1865e2ea6fc71f78a7d2182415b6ef5e549562d79
SHA256f3b4a0d995dd6f531b96877a3175bcf6a17a79db505162dd932dffc9b05370fc
SHA51280026518cf752e6b6858d7b47fe1527cfac2de3c74a97b543d61f90f0fe2ec4cbd3af0b7c6f92e5d4ea8813f63e0127e22666f4b5583e61477380fb4ade1c370
-
Filesize
116KB
MD587995ad4e52aae352d36608492063ebe
SHA1641e390feeb24795041ec5c98f48aa1d088956b0
SHA256cd79321291d87dcd05e6d52e25d2da21fd70323d04529ffc2f6c51b294d2f0d1
SHA51203b48e0ddd2b4e5b628963540207fe957898be6ac07b5cf9fa8a4b6ba85f05b06a1441cdaba46a68c99672dd8d508d980c4cb6926b82af3754f77ae549884481