Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2023 08:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://abb.my.salesforce.com/0032000001gvjkn
Resource
win10v2004-20230220-en
General
-
Target
https://abb.my.salesforce.com/0032000001gvjkn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133266346046076749" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2275444769-3691835758-4097679484-1000\{F800E4A3-7287-42B4-BAFC-0D46F2E2AFE6} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4896 chrome.exe 4896 chrome.exe 4884 chrome.exe 4884 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe Token: SeShutdownPrivilege 4896 chrome.exe Token: SeCreatePagefilePrivilege 4896 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe 4896 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4896 wrote to memory of 2996 4896 chrome.exe 84 PID 4896 wrote to memory of 2996 4896 chrome.exe 84 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 1492 4896 chrome.exe 85 PID 4896 wrote to memory of 3188 4896 chrome.exe 86 PID 4896 wrote to memory of 3188 4896 chrome.exe 86 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87 PID 4896 wrote to memory of 4672 4896 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://abb.my.salesforce.com/0032000001gvjkn1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8659e9758,0x7ff8659e9768,0x7ff8659e97782⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1768,i,14094237876128888633,8693737735025073698,131072 /prefetch:22⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1768,i,14094237876128888633,8693737735025073698,131072 /prefetch:82⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1768,i,14094237876128888633,8693737735025073698,131072 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3200 --field-trial-handle=1768,i,14094237876128888633,8693737735025073698,131072 /prefetch:12⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3208 --field-trial-handle=1768,i,14094237876128888633,8693737735025073698,131072 /prefetch:12⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4600 --field-trial-handle=1768,i,14094237876128888633,8693737735025073698,131072 /prefetch:82⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4596 --field-trial-handle=1768,i,14094237876128888633,8693737735025073698,131072 /prefetch:82⤵
- Modifies registry class
PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 --field-trial-handle=1768,i,14094237876128888633,8693737735025073698,131072 /prefetch:82⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5592 --field-trial-handle=1768,i,14094237876128888633,8693737735025073698,131072 /prefetch:82⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 --field-trial-handle=1768,i,14094237876128888633,8693737735025073698,131072 /prefetch:82⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4728 --field-trial-handle=1768,i,14094237876128888633,8693737735025073698,131072 /prefetch:12⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4724 --field-trial-handle=1768,i,14094237876128888633,8693737735025073698,131072 /prefetch:12⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2808 --field-trial-handle=1768,i,14094237876128888633,8693737735025073698,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744B
MD517a7304278383858eb85eda17b0851e5
SHA159684ac2487a0a5c6f23bb3b41465bb378485111
SHA25666797c35f182c0908e7781e69d8a765687338423a7361743ba3ea4034db1cf10
SHA5125cc14f4274a45c3c03d458fd8223d3b585c648e5cc9e8b78ab1c184586db1dbf2d8ae2c8bdbc6dde7dbf2a5593505e68312c76345344783142e65536b2e63a55
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\5550ad4b-00b9-4191-8851-90a916847ff6.tmp
Filesize1KB
MD59da88f79cab3e523ed79e8d8e0d9d192
SHA13480623d97f5eaa64269e044461a8779ef424173
SHA25679b62495cfe114db18d5221a83dc1aaada59e30476773a8ad5d60df4590b1631
SHA5128c6c81d32ed7797d80610a62e542779cefd8078b69f3f7a8622cd734d9d3a23ff245fb052a83fb6044ee8a06c75edf8b42f34f83d72c3e052dc35c77cff3d7e1
-
Filesize
2KB
MD5f5a58aa45dddbab610cdf3c8596cc8ee
SHA1df41c7572fd7147ec563401919cd0b09250dff04
SHA25673d972e9fc7d1da6dea2a75edf081da05a4f0dfcec68fff9c9bea6e72ac96ebe
SHA51278c9227be3b662306aa181c814e90090dcd9b5da4870239c32a7b72b3a5a347d700c1f15c2e50762efc6af9bd07f571e33d3ce0e0fc9b62956c311c10f51b577
-
Filesize
6KB
MD5b17b0bec0eea29d0d15fea8ba97322f0
SHA18e553c4c06c4ce881b3cf4fbd51bbdf3413f5afa
SHA2569f27a47fba29ddb7a3955cb2a4371ec1b51424ce64af2158becd3f16e2f49927
SHA512da8a7c083036ad131c8ac8fb7b9ff1d4e6d7fa86cd52883c18ac6d4d75d6a4187db43df7ee600537c0dc33469e6cf55eb85175148ab5ea3597d93d86164c0441
-
Filesize
15KB
MD530f8d38b9c1eca041da3825fdbcd9d7b
SHA18a918bbbda0bbcead84fde1beac00545a356520b
SHA25682b38f638e6290eeff6c8d4b8bcdcf0e43b8a48f1a5379314a9e6598b632b65e
SHA512650ef991f225e185453e140c18f0fc816de033ece857655a992e414e26110d3b7a7e9552bfc8304add462b9d2ba91853e91a8674af4afad107783e944934d3e9
-
Filesize
200KB
MD52c23cd72f20ab9c7e917b324d073e5d7
SHA1d0cd20c881d3fd008276dbc72461773c3af4a3b7
SHA256e2267e248056e5f65920671bf5185a2a01d52c1bcea76faeab60ee90ccf0d000
SHA51200a0194029996ab0618c95fa9922650a8de3bb7a0048191832584814a1aa80be1ce93e5630db94b61b23940fcf2c955674e56167e24567d7022e0310e39d40e8
-
Filesize
200KB
MD5f1c88c295cb5eada8f4913f7a27371ea
SHA1e195911de78993d70c47cb3030e1e8605741ef63
SHA256291d7bbffb7cb88a931e3975a876806c0c7c20768c2f9b5d0e61b831a55c0dc6
SHA512c12fc3019717cbb5635b90286d075f6810fef5662836c31a9e3c0f70157beaf23d7edf61034a8f0996c97876eb59a3310e61575a0dfbfb9f3c014031ab350fc7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd