Analysis
-
max time kernel
58s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 20:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1fwJdsnnK8CE52uB6ttf5BOyA6_zlBL57/view?usp=drive_link
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1fwJdsnnK8CE52uB6ttf5BOyA6_zlBL57/view?usp=drive_link
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133824846479696512" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1536 chrome.exe 1536 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe Token: SeShutdownPrivilege 1536 chrome.exe Token: SeCreatePagefilePrivilege 1536 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe 1536 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1536 wrote to memory of 3448 1536 chrome.exe 82 PID 1536 wrote to memory of 3448 1536 chrome.exe 82 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 1148 1536 chrome.exe 83 PID 1536 wrote to memory of 232 1536 chrome.exe 84 PID 1536 wrote to memory of 232 1536 chrome.exe 84 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85 PID 1536 wrote to memory of 3608 1536 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1fwJdsnnK8CE52uB6ttf5BOyA6_zlBL57/view?usp=drive_link1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffff6e0cc40,0x7ffff6e0cc4c,0x7ffff6e0cc582⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,2223629107345779335,17311354005707845479,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,2223629107345779335,17311354005707845479,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,2223629107345779335,17311354005707845479,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2344 /prefetch:82⤵PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,2223629107345779335,17311354005707845479,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,2223629107345779335,17311354005707845479,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4616,i,2223629107345779335,17311354005707845479,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4460 /prefetch:12⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5128,i,2223629107345779335,17311354005707845479,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5156,i,2223629107345779335,17311354005707845479,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4688,i,2223629107345779335,17311354005707845479,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2056
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5b62af4b97668b6d729e4692437311a2b
SHA1c34e92351b03bed1e9e5f6de5b6551bd474571f4
SHA2569c3c268d7c0749f94efde2d233d941fcb2009a157f0385b38532a395872e1c73
SHA51229b445efddf9820aa146b60ca685fb1ec9bb1abedc2952f513fa9a3edde16f2eb3b85d8d8aafee129cd1fd4c03271744540c60cfc04bc811618d4024e280f066
-
Filesize
432B
MD577643617e5e2ea7baa971cb2779029d0
SHA1335e311c9d78fedf457b55a44d9e73d7e4da49c6
SHA2565be2b03cb7f8e1a4a13ce27c925fab8dba1ab539218925f426bbadb68fee0e70
SHA512fa0ad5b458024ab76f5a11619782ee47d54828c23950033e0e34f6ef7684ae34b8251b58728edcfcb30a1b754d0471e774b3ac0d0299a7378630ad473c7107d7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5d91b449a48e833f2df2c15ad8e3658e8
SHA1295eabc757ba4d147c003ac1fb0d700503c85d73
SHA256b4eb85801d09debda3f50ace216ffcc96984a8f8420f95764e284b963b1333a6
SHA512a2f1dfd4f338f09f4404170bf459a9e93c49f95bbd4b43b06a163249911c52b9467547723567fa7929e04fb1a7e9903846802359f49cdf35d638f4a11a52ffca
-
Filesize
10KB
MD5b8e3fb81daacd3bea993c54902286d18
SHA1a93da22fce9781bc6503d39e82baa3fc8f1fa173
SHA25690a58e1ad9be5d4ed02ef978b0a110db1be5addf202d89ce26da5a609305666c
SHA512c780740c39bbb81f687681ab36232b74ce58e6ac15325247c67212b1b817ed96fa62fe87083fede5176d7fb71553780169717e219d05ab0a66a5d54d81030d9f
-
Filesize
9KB
MD53c16ec195bda03372b3dae54f8f785c0
SHA1746d4f96eaad4cbd6e4bce6763caee5a84d53833
SHA2568edda8f187aa593b236440d74e1839525a9c61ce4463093376077e1003dd4a76
SHA512cd1ea15e420e7d1deaadbb3488b5ddd459fbbcebafd87956674e57b59042732f3767147a01ecd37ddd3fe66b5ae54a9a3226b8c14d2f2443d5aa3a0908c2edfd
-
Filesize
10KB
MD5b14242b276beb620e6bdb73d82b4e1a5
SHA19097ecf893cf6d02e7a7f83568b46e954d7872e9
SHA256efa80eb3818aff2f4aefec861f814b47efb41a9bfbf7563f3a6953ca83e8fd7f
SHA5122882d13afdddd123220545d16fa423833af25a084cd0d5d1cd06915470ae71a4d72a025bb6c7681e0f85828a4c7aeee0cd889f2076d745e2ab57a88be31ca338
-
Filesize
9KB
MD50eeda94c85680f115d17efd341de69e1
SHA10a9a100ee458b499fcaab80db44da8e444fefa5e
SHA256cbd668b1a5110ca2f6f5f83ef5bed35fd065444d7ce0672b9851787bc85fb669
SHA51222bdd235bb42113ba2ef68dc0c9b0b978904b4c303498c7c73a69df6c562b12f7e7fb39f78ec36f2ffd328c16d1ed0f6f7000df18aa5b684ca28eb10f4ab2149
-
Filesize
116KB
MD54d1f1ae47c597db710e365b0b9db4dbe
SHA1e79b0c4ed0c69aa9c2567c46be3b05775d100af4
SHA256791f860afb2c8676cf89ce1e5ae863ee8df697e75d9d2a41e57df9da01ff19de
SHA51230721a18bdf8ee5d6ac5300455e344e81f529b1ba79bba8d9f202de529ad223cd1a6c88bc993528f54681e4a5d0822630c344aabad1b4951780138dfd4a4bf45
-
Filesize
116KB
MD5464f3ddae4f2d2ff456e93e6c98ae532
SHA16b623101882c7837ba0c51e9c02d59ec8be9b32e
SHA256cb7eaf6e79ea53f28efd82fd40a3b94440800eab89af6716051710971190daed
SHA512bb0c59e5203c84f3964d5b614b20170665a9a22fab969bdb80b36e1f2f5dcd319c4584461a2f673bc8e34cbcb7ac8d2fbaaf02a1d1ee1c21ca7ad4dcdc9f7bfa
-
Filesize
116KB
MD54c3acd7f7e69ed82657567b68dc582fc
SHA14ab4761938b896c9e9c5765ed8f561942b5fb31e
SHA256afa681405e9aa6b340308205b03eb88573b72a4626accd1e6f54ea45c51ff559
SHA512829b485003eac9e5aa74d0344b13fcd00f5a06ed462ab0d8f45dd8e806396049787e3dd99e639513ad32dcfbdcd79ca7d4fe8065d8bd69a53b6cd4338612fc9f
-
Filesize
116KB
MD534aee36f68393bc719122b14f15942db
SHA1deefc925894b6ac91ec77bcb63b1e6a553c15eea
SHA2562d8b1b2503297b6277f1898dc637187d326ffb72bf0bc0cab3d0a4c2b3cae828
SHA5126d9567dc1bdd3a25b7de35530874c79c0b9fb622128a45e4093d96f17cc6251a4c382815855a0acc6a08cb77ce626fef74a6aebe3e42061ca47ca27a3053a7ec