Analysis
-
max time kernel
175s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2023 00:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://91.189.91.39
Resource
win10v2004-20230220-en
General
-
Target
http://91.189.91.39
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133295408360651162" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1168 chrome.exe 1168 chrome.exe 5116 chrome.exe 5116 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1168 chrome.exe 1168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe Token: SeShutdownPrivilege 1168 chrome.exe Token: SeCreatePagefilePrivilege 1168 chrome.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe 1168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1168 wrote to memory of 4852 1168 chrome.exe 79 PID 1168 wrote to memory of 4852 1168 chrome.exe 79 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4556 1168 chrome.exe 81 PID 1168 wrote to memory of 4924 1168 chrome.exe 82 PID 1168 wrote to memory of 4924 1168 chrome.exe 82 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83 PID 1168 wrote to memory of 4844 1168 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://91.189.91.391⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbaca99758,0x7ffbaca99768,0x7ffbaca997782⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 --field-trial-handle=1824,i,7550815917129703010,15508578174412257792,131072 /prefetch:22⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1824,i,7550815917129703010,15508578174412257792,131072 /prefetch:82⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1824,i,7550815917129703010,15508578174412257792,131072 /prefetch:82⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2916 --field-trial-handle=1824,i,7550815917129703010,15508578174412257792,131072 /prefetch:12⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2924 --field-trial-handle=1824,i,7550815917129703010,15508578174412257792,131072 /prefetch:12⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4696 --field-trial-handle=1824,i,7550815917129703010,15508578174412257792,131072 /prefetch:82⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=1824,i,7550815917129703010,15508578174412257792,131072 /prefetch:82⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4812 --field-trial-handle=1824,i,7550815917129703010,15508578174412257792,131072 /prefetch:82⤵PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4776 --field-trial-handle=1824,i,7550815917129703010,15508578174412257792,131072 /prefetch:82⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3840 --field-trial-handle=1824,i,7550815917129703010,15508578174412257792,131072 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 --field-trial-handle=1824,i,7550815917129703010,15508578174412257792,131072 /prefetch:82⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4892 --field-trial-handle=1824,i,7550815917129703010,15508578174412257792,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882B
MD531f31859ce81ce04d8827b7c82406d26
SHA11d7f4728b2e782a028c81919b60ab37c65648bb9
SHA25661e0542c624f90dbda10661c55153e14621adb1a12e66857d0f558a1977a6416
SHA5128af483aef471380dea63fd2358aa0dc322fab1fea240a2e3b5fad25343473b997e7ccc4393236baa77219da903e8258afd6a8fbb6cf9640b4cfccd9cb5edbc38
-
Filesize
6KB
MD582df9b61250c8f7ddf02ce253d54f209
SHA12bb5a92239048c5b7d853ae7e629ffa47e0b5734
SHA256694802d1d1bca5187342f38b6af856fc5867cf672f95d3429723a82570e6b18d
SHA512241329cd7065ff7850ae150ebc4b7a24d714fa27f5add5fbf8f609a72c805bce6f3713e1ee14cef9caaa70f70ca980ff57264ee82e98a21f72968d3c5f56b114
-
Filesize
6KB
MD5c2f19acfef7cb3101fdf981a065c41a4
SHA1edb01330426e8a0ac7ad89f77c184cb4895c74f4
SHA2562bc14176b25ddcb40dc9cc190f2c64ee5cfc020964562629611bd6ddb7c0286d
SHA512f7ea8f15c3583923add8a4aa18e91b5195c1fe5724c00394ae1bd0cb0bd7cad2e06ce887d030ee6eb642431af56c4fd9b192fe29fed1af180931c99bfa2fe344
-
Filesize
6KB
MD51d0d9d364184d567e871132a655ec2ae
SHA1baa75c05e1c4fa56211c18a70e9b808ee1e4af1b
SHA256a7d1ed98d79144e435a5a01b2db5b3e423494f2eba25f759629bf3c258f0d4fd
SHA512acefa4e7424248e5b40ec80f418a9062f0751b8809ff339a93d874c0af7f228bd0715e79967678b7dd05a2ea831527a2b7cc19d5592039044dee721ff1aae086
-
Filesize
6KB
MD5f7bd6ad89285beb041fd0be7d62c26b3
SHA15418ebb80975442eeea9e3b9227d9977c05be757
SHA25673d0f26ece73df24df4a6fde5a1b6367925c456ebeaddb83b8942007b0dec43e
SHA512b6bcd014d3b519c8aab3206d48a1fcf27aef3ef47b667128929ea2113951e9824fd3511dce7e653862776f28612d1d7ba7cdb9f54913e598063970b158ca669c
-
Filesize
15KB
MD5e361b1866c90eac97901d009302218ae
SHA11f181d04569f6796d50ee55c68fdef27c96c6fc5
SHA256bff46084c66910cff534df7b2883ebd109850b32d4192f66421841b6e364ba0d
SHA512ac618aae0356613f751a574731d544f17275e2fa2c9eb8a2763a4334b75dc7f955bcde1b715be2279b18375dc7c50303aca25ae1de38b4d0bd5e3063cb6975e1
-
Filesize
153KB
MD524502c7ee41f3dd41bfc516c8ef41c7d
SHA1440f84adef6f5e6922e36faccc61b227c6b4a281
SHA2564c349a52808c95085640982f5ced98484ca71232462593bd6241018f0f7b13f3
SHA512c68a78e92350ecf83f22dc648816550a1f1ef48b634f79824bb796488e9d422389b87c06e330f82a6e0b7f3cd1d71e042aaa376f321d7180410b0e43114f6925
-
Filesize
102KB
MD5edb1ffb9aaf0ae1b6e7d0c639a56a248
SHA1c62c084afe8016393083b6275912f51ea2adeb7b
SHA256f878885f2070a82d9d3ae5ebe6ef579ebbfde91612c82b4621c58807def75f04
SHA512398b6a6582416779c39f70468b4561b58c64a25a43d3aa2bf9b70299291e8bd044c9e0c414a11fbfcfe38d9283cbf2421214b9ffb6eacbe9073fc7dab7e0a55f
-
Filesize
96KB
MD5035183eab3f96a60b6341180a5567280
SHA14543439b015c6d9027caf5320b499ed1cbd17e18
SHA256afc0ada3a444f2aab180a81dc3a5749499724d84aeee2e3ce2cdf455411aa172
SHA5125e07bbb9e4101ec966f65c1a307701078eb32cdb03bc6daf54eb52038ab3340432b5d042ef9512f3a40e02ae548c05f2bddfd1b24e9498a7ef8390224cb3f543
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd