Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2023, 16:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://lemmy.ml
Resource
win10v2004-20230220-en
General
-
Target
http://lemmy.ml
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133312329717688939" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4564 chrome.exe 4564 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe Token: SeShutdownPrivilege 4132 chrome.exe Token: SeCreatePagefilePrivilege 4132 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4132 wrote to memory of 2516 4132 chrome.exe 87 PID 4132 wrote to memory of 2516 4132 chrome.exe 87 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1952 4132 chrome.exe 88 PID 4132 wrote to memory of 1848 4132 chrome.exe 89 PID 4132 wrote to memory of 1848 4132 chrome.exe 89 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90 PID 4132 wrote to memory of 1768 4132 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://lemmy.ml1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe48c9758,0x7fffe48c9768,0x7fffe48c97782⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1856,i,937331436811872456,17441241268192657425,131072 /prefetch:22⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1856,i,937331436811872456,17441241268192657425,131072 /prefetch:82⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1856,i,937331436811872456,17441241268192657425,131072 /prefetch:82⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1856,i,937331436811872456,17441241268192657425,131072 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1856,i,937331436811872456,17441241268192657425,131072 /prefetch:12⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4564 --field-trial-handle=1856,i,937331436811872456,17441241268192657425,131072 /prefetch:12⤵PID:3300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 --field-trial-handle=1856,i,937331436811872456,17441241268192657425,131072 /prefetch:82⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 --field-trial-handle=1856,i,937331436811872456,17441241268192657425,131072 /prefetch:82⤵PID:668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3716 --field-trial-handle=1856,i,937331436811872456,17441241268192657425,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5d3bb9e84a9cbf4918acae31006d534a6
SHA1d8b18865e443f1bf19e93e344e64724d35bbffef
SHA256bc9df6df64ce3d132752950c884aa34adb529d713d53967ab861de9e048362b3
SHA5129028435bd7ad5b9ec691e9313ea4895db817b11c4b9b9a9f9e66a8acf886a1da2bc186eb5d0fe3064189388ad83ff39255c7c1a036af9cb2e7470504afb30d23
-
Filesize
1KB
MD5c0662fbf65f13cedf85302f00fbd2999
SHA164f017adf7817a0c6b9c721f61005ce4b9b6edec
SHA2562e754b8f39b583ecbe992dc08f81dac373b9f9a452e25262fc14a6528e1b11cd
SHA5120e69be432eb174d726de2a142bd99a9e5d55a3d061c9ab843b679f4c8bc4489f3e0ad3b088771c4805c131a5daec14d1cae020424e3840906806f14b37914327
-
Filesize
1KB
MD54eb00fa9eadff9037495d993f26d726a
SHA11eebd400a3ba64154e6c2fd84e43834e55e2e018
SHA256a11eab6284d699e9ac1abedd6271f989d97ed23f121cf6340dd768982d56d73e
SHA512425c2a72922e31d98f41dc356627415eacd370bc9a12582f7fcb81736cd976be9cdd061efb2365a9f620518eee426b079c4416c7383da0ef5b4fc51e961cd407
-
Filesize
1KB
MD513609810bd79858f240f581265fe6669
SHA179f1e93ada6a839cfcc1659ba82b06c57faf9d99
SHA256975b5b6e7391395e100e2b06839d0c2f08e9c840efdc4a9ee8f7fd546b169169
SHA5126a8671ed279c56fe08ec237dde5671265d8a6a4bcfba222500a350119e41015df47847d8ca023f2de60eadcc53974551e43389ddbedf308e9abd6b10b5d7c4ca
-
Filesize
1KB
MD5303919fc96b98dbfd117f0cfad5b6788
SHA1d32a7b8cbce7a05bf3856dadea49018f2447b118
SHA25691b754b8ce5c14e1f30a76e2cec488ec6ecb1ea6901e2c79dfa550e4c1965aa2
SHA512e1da9557794df1b2d7811280139f04874976a006554dea6d062a83018691ccd16e7408c5ef184e9d6c8dfdf1fdfb7e7512405fbb8bda89985a9b5dbe2d629a5e
-
Filesize
1KB
MD5122c723adb4dd553563612f3a9028ab0
SHA1b394108cd336e853ba418def6af9372ff5bd1774
SHA256faa0a41828f551b23fd28973a7fcd24a96fc026ddae4fb7c0f33fade0ae55e7f
SHA512f807ee8662c584b247a15ad56c574424682a3a3dc5670f2e71cee9b6f9b0a374bb81b625f212652b23e027643a06f519936b3bc72a16f8bcb3f99f78b591f1ba
-
Filesize
1KB
MD5277814789c7d8e07edfe2459c694a57b
SHA1a32fb616b43d1f761edadbc86e7377914784d85e
SHA2567485a7e9e09a523bf8e411dfd61b8731a6d4ebb25ee540d6c5ed44894a9d44a9
SHA512c7a5c7d439a599ced89a52abad727d712c7fd541d03dfe8a365d61ebf91e5fd01374be6d0cc1dfd70afa2db06035c43bd1c99e85abc0c3bedc34d22359e496a4
-
Filesize
5KB
MD55ace16a448fc24d606b2b69234f8cd94
SHA1100b43cc68d11509f885724530b5e615b5da1a89
SHA256b895244688c69641be224c6581bbf9653b78213a2827e138c1fc945b48b13428
SHA5127ada582ab58c41a082a2a7e593566b7f146eab070b7c466910c84d060c5f3680061b7697c2de5ed19798e4a55643013e07ebdfaca556f6a61975051e4b0a37eb
-
Filesize
5KB
MD53faf38d4485f5140734075f5096846ad
SHA12f5b591748ad516b4b06665bc53feb3317e994ed
SHA256961ae94854ef3d8247ab525d1f5f8d1460e46d656138c85a2d43672c73fe7742
SHA51225276c0e71ecc2b69e7aa331378a80b85bb64b87611a4e939a6c499bbcd66e15f43300c760a7ad6b23048473e79d66ec89defa6a917d779347c28683b365563a
-
Filesize
5KB
MD598c6080f6167a2dccfcc5ceb0903a8fd
SHA122438534bf86cc92573b81d1433808af470a1e2d
SHA25623c8a9e79ec0392caf9f419280b997ad326cbf1f20efb22a2e865c19a6240a58
SHA512aa26eb86f47c68c436c22f891797bdd81b756b0b6d7764b2c48cec9d2295ecfcb9ff8503bda624ed87d0c1f0084ab3cda29a668130977fac0eed0070da00170c
-
Filesize
6KB
MD5b5b93e2271070f5d9b5e9b91e0529174
SHA125ff741532485c7dc06d89a09ce339d1df743290
SHA256f0f0483e4e6e461b1e66cd59e47e32510f3c955c87f450fc067baca1950bc8fe
SHA5127c83d16b37923c4de856ad48350ee8ad8d7ea08fe81dbf7775117754f0286f769d9a4e08d85f3befaf8632b757f7835cec52a67293022848ab432854e57a8e14
-
Filesize
159KB
MD5cdee241885b6b17d0f7053e6f59621ce
SHA1a119104602ce93feb3d17e4846b2f4a0ec9f9762
SHA2562635095ca5cd2d2b365e04ec05e8e8884ca7a40526b9b38bd873b5fbafe4bd9a
SHA512e6b57c32643ed3d17f1e65533584de2a3ddcaa95bbf41ed2369b2a3fa0027e0e9a25adddf32a3c5d2560a92f10fb80adb70f83b8e94804a02a5174d6f8aad068
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd