Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 12:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://5sjmknf0.r.us-east-1.awstrack.me/L0/https:%2F%2Fapp.icount.co.il%2Fhash%2Fpaynow.php%3Fcode=Q01jVVhJQnNqQ2NlMXVEckNHOFRRbGI2WVJETXpwWk1pWXc5WE4vb0Q2UWZ5L2lEYVlaaG9BPT0=%26docnum=32516%26doctype=invoice%26lang=he/1/0100018723aad462-d9a96a64-c700-440b-b385-8fdceede5e44-000000/v7unO4wY0Sw2BdqSZTKPqsKXGCQ=314
Resource
win10v2004-20230220-en
General
-
Target
https://5sjmknf0.r.us-east-1.awstrack.me/L0/https:%2F%2Fapp.icount.co.il%2Fhash%2Fpaynow.php%3Fcode=Q01jVVhJQnNqQ2NlMXVEckNHOFRRbGI2WVJETXpwWk1pWXc5WE4vb0Q2UWZ5L2lEYVlaaG9BPT0=%26docnum=32516%26doctype=invoice%26lang=he/1/0100018723aad462-d9a96a64-c700-440b-b385-8fdceede5e44-000000/v7unO4wY0Sw2BdqSZTKPqsKXGCQ=314
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133258615015856437" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 396 chrome.exe 396 chrome.exe 4460 chrome.exe 4460 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 396 chrome.exe 396 chrome.exe 396 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 396 wrote to memory of 3784 396 chrome.exe 85 PID 396 wrote to memory of 3784 396 chrome.exe 85 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 220 396 chrome.exe 86 PID 396 wrote to memory of 4772 396 chrome.exe 87 PID 396 wrote to memory of 4772 396 chrome.exe 87 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88 PID 396 wrote to memory of 3676 396 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://5sjmknf0.r.us-east-1.awstrack.me/L0/https:%2F%2Fapp.icount.co.il%2Fhash%2Fpaynow.php%3Fcode=Q01jVVhJQnNqQ2NlMXVEckNHOFRRbGI2WVJETXpwWk1pWXc5WE4vb0Q2UWZ5L2lEYVlaaG9BPT0=%26docnum=32516%26doctype=invoice%26lang=he/1/0100018723aad462-d9a96a64-c700-440b-b385-8fdceede5e44-000000/v7unO4wY0Sw2BdqSZTKPqsKXGCQ=3141⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7ff87f649758,0x7ff87f649768,0x7ff87f6497782⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1820,i,12930507283916834606,5725529224127392781,131072 /prefetch:22⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1820,i,12930507283916834606,5725529224127392781,131072 /prefetch:82⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1820,i,12930507283916834606,5725529224127392781,131072 /prefetch:82⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3164 --field-trial-handle=1820,i,12930507283916834606,5725529224127392781,131072 /prefetch:12⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3172 --field-trial-handle=1820,i,12930507283916834606,5725529224127392781,131072 /prefetch:12⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4740 --field-trial-handle=1820,i,12930507283916834606,5725529224127392781,131072 /prefetch:12⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 --field-trial-handle=1820,i,12930507283916834606,5725529224127392781,131072 /prefetch:82⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1820,i,12930507283916834606,5725529224127392781,131072 /prefetch:82⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=912 --field-trial-handle=1820,i,12930507283916834606,5725529224127392781,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\8a77b3eb-5f20-4662-8e35-5cde90aff394.tmp
Filesize6KB
MD5b910599f342ef51bc94eb49fa9b66e02
SHA146c838593f1c194c3cd4d488db85ca063def32a8
SHA2567f3b8738378a548ef55296007d563739b3b518187d009f00bdf4b6ef555ae6b9
SHA512d96b20d3de92db02e9aa2d40bd3bd71e6250a87f8ce6990b259e38d74aa68b96d6a6f6f8a87ee0f9f4ae1f647d01024ccc54ccf70e49b7eeeb736f65fc1d3da7
-
Filesize
528B
MD5efd0104dcd740c5d3881a009555174f1
SHA1d2ab54866660bc36337818f68f96d1c169d49e7c
SHA256bb280f4f42d457216dfee3f4f9ec43233f5e36d1a0e59feb300f642e20b22e19
SHA512dc58aea44acd3341fc03c301b4c4993cfb043aec70f99c2acd3c04fefc2271c5f008b51010aa1f377d5f9ca41c1792563a0772645963ee5d28e035a1b2d0b7e4
-
Filesize
768B
MD5fa782d7a4d045ab2766b41f07e992b03
SHA12713912d7d0dab7b8ad6740d57589310c23604f3
SHA256daf73e33215dbac602f7bdf709e856efd32099dff42a731349731be9e508c461
SHA51263c1c42caad35d2a3437a73fe50a7c15f289dbf26c1b98806f31389d05b916f09f58998d247aa096cad5ecb8461e73fb7c2a821d0607c467b52ba417726a2956
-
Filesize
1KB
MD5d3b02163ad29cb2130a2edeb7c944809
SHA11b7c6802654bb3a9a8b782d1bb104f2aa134bc78
SHA256e71d8afc0959617d7ee8754e5bef2a51ff2c1a309c847776d4775640f1bcb728
SHA51254cfeca1e155f26e6bc94971fc860f3a0ebf99fd59ef5a2fea4b3df61209263639afd0cb4ca1af39799acfbc2cf54ca537908f1103f7b594925742c7c36a60b4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\b5a72682-a4c7-4482-824b-0a17cd28806b.tmp
Filesize1KB
MD525f11fbe6133c887d4e2ab5c892e9792
SHA198830cc53efddaba70a755dc888546d2ba230cf7
SHA2564d9e58aa2328ecc9228fba98e73388c466506a889aa573c81ca4cdcc1f4c4f73
SHA5129052ec95fb7c3e801c5f864193968f2a0598cf1ef82729d66d1168b23a4565eb15b477493ffe00b681d00ce02d3d649573064cbe434f4c133fb38dbe1345b936
-
Filesize
5KB
MD5a3598dff703bd8e6341ea8ecd61c4ef8
SHA11f81d4fcb12e8fef5d0504cf1c17ed9c50b21dcf
SHA2566a869e852b0ab8aa56c6acc35e2e6d789d0968bb335fe3847d41e90ca739c60a
SHA512eaac8e1d99d358a12b07ab56ce1302c8d09c10e3943a8179099ce42945f52d823a5a98c53ce00f841532dfdb770fa8ebc4d3e03db94bd41b936c051ed954da45
-
Filesize
5KB
MD5e2d73e572a353682b72afb13919e87d3
SHA17caf4db35afc86a3c8db3dfaccaf37043c9bd2e0
SHA2561685407cfa1f1800e44e28f249d91fca4fbb2d9aa0ba49fefdd2020527c6bbf8
SHA5123386cb222c2173356a2291580a3868a621ce02ae5bd49940796ccf3c344badea8dc2e72c32c4e908360e5c8ddca2565ca9c65988f3c7f8177a983751b203bd3f
-
Filesize
5KB
MD59d01fb9561092b3377761f0b23bc5639
SHA10d47cb994556b62b0b963e85e8f71bef15ef1ea0
SHA2564175f90089a76a9818b0ff50b941fc26943e605f6ed402d47f3bff3dd6460a70
SHA512e3e5a02b24112ab84086c4d63674a470fb1ca313dbfb7d6c07801a34556d9683bab1153700eb351ffd6aabc68660fcdccde45864a22ad226bf6be9c761e66567
-
Filesize
199KB
MD51c8ba125f77b7842ca1ebd0285241a9e
SHA1a41519952b4bb5f3e16ea4a754019821ddf11e08
SHA25620812570a4c668ac63d218364aa9d2d481cfb9a87347f0b85e47aaa5d5db9fbb
SHA512da3521e9b7a5fe8487c02550d621b70397b40588d50bcd825ba15d77f6f3e25e22abb988320a7067e89b7518b5ddd43b711bf8a741bb98211e8a59da878d0eaf
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd