Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
10-07-2023 09:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://protect-eu.mimecast.com/s/j93DCJPjVs0voXgfVTRR3?domain=irevfet.pro
Resource
win10-20230703-en
General
-
Target
https://protect-eu.mimecast.com/s/j93DCJPjVs0voXgfVTRR3?domain=irevfet.pro
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133334565013299754" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe 2568 chrome.exe 2568 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe Token: SeShutdownPrivilege 4292 chrome.exe Token: SeCreatePagefilePrivilege 4292 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe 4292 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4292 wrote to memory of 3396 4292 chrome.exe 63 PID 4292 wrote to memory of 3396 4292 chrome.exe 63 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 1812 4292 chrome.exe 74 PID 4292 wrote to memory of 660 4292 chrome.exe 72 PID 4292 wrote to memory of 660 4292 chrome.exe 72 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73 PID 4292 wrote to memory of 332 4292 chrome.exe 73
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://protect-eu.mimecast.com/s/j93DCJPjVs0voXgfVTRR3?domain=irevfet.pro1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb9ea99758,0x7ffb9ea99768,0x7ffb9ea997782⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1832 --field-trial-handle=1580,i,6195571918869759142,11075915451784269495,131072 /prefetch:82⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2088 --field-trial-handle=1580,i,6195571918869759142,11075915451784269495,131072 /prefetch:82⤵PID:332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1620 --field-trial-handle=1580,i,6195571918869759142,11075915451784269495,131072 /prefetch:22⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2992 --field-trial-handle=1580,i,6195571918869759142,11075915451784269495,131072 /prefetch:12⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1580,i,6195571918869759142,11075915451784269495,131072 /prefetch:12⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 --field-trial-handle=1580,i,6195571918869759142,11075915451784269495,131072 /prefetch:82⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 --field-trial-handle=1580,i,6195571918869759142,11075915451784269495,131072 /prefetch:82⤵PID:3312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4764 --field-trial-handle=1580,i,6195571918869759142,11075915451784269495,131072 /prefetch:12⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2996 --field-trial-handle=1580,i,6195571918869759142,11075915451784269495,131072 /prefetch:12⤵PID:4332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3772 --field-trial-handle=1580,i,6195571918869759142,11075915451784269495,131072 /prefetch:12⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5232 --field-trial-handle=1580,i,6195571918869759142,11075915451784269495,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 --field-trial-handle=1580,i,6195571918869759142,11075915451784269495,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5a098b8ca4b8230ac6664ef63a0036e4a
SHA12eb61795b68453698132bbbf207bbfe6f3e84d39
SHA2566dd00b926d600cbd8bfeeb55ed2cf41394ef68285c4b297042545ab410dae957
SHA5122a4e6f5967469f0b3cef9609e3c6f6663ded140a0594d033d1172b8a42e5c549f3a6b7874137073774a92b71a2c97955ea9f150d9f9b58149ca0c2071fed47c8
-
Filesize
2KB
MD576c5728592fbea997f819df6d13e8495
SHA1d32104885dbc14544c9db75f9542c5ef8ea489fc
SHA25604963cf78357e49b156f26c8b7321d5e33c09162f6ac5761f96cf04fd94e8597
SHA512b5fdff8b7cfa0e18c75881f5014e0066d9a5b59f69b3dd4d8ccec5845f51c341af1313db56b2aa8bcb1a96cfd56c25fbecba5cd4fd6636537f79f88e601d1933
-
Filesize
1KB
MD581d2270a397e46bb7fcdb3a5fdb19fb0
SHA11749d49e6840007babb6d2807947b00d015942ce
SHA25695443d07bf4e9a57c0414a7c6937dae8b3c4c97b5f512260a996ecb60ddb0385
SHA51287323ecbc2633237401ea8655b497f55892bb2807c3381a006396cb4c2a8d1a52377a8e6a4c1130d7c8600bf887ec8bbf4a1cc26762237a84bc894f18ffc6173
-
Filesize
5KB
MD5cb7196ac7d75730ac08bf9f6bd7fa2fe
SHA1d2c46319db117bd5cf0f0cdf35050994239d80fc
SHA25634658bd205567f6c7affa9e8a436dcc984a79345737dd1480ccfea9317db7127
SHA512d1627586a686b382e5ab797cb52440ebcc29dc4519be0563b7045f3b91201a69fd36caac9ed0706b81ee75ef1d4281018271fbdfbe3307056f3e0d3211b447b1
-
Filesize
6KB
MD57ca24ed822e45c735dbdd34ad6e444d2
SHA19daf2da312c9cb88a678dd3bea8e8ffc41035c6e
SHA25668f50194fd36733e8cf64ca091aa75088675c90010b1da7dc3589b748ffe7c4d
SHA5127ac7e1038c1b4324d94de29c1f9847b30ad04d5ada8c8554d7c20c637842fc8b2ebc3c45ab5cb65dc791a1fbb55b771e00f72b1da55bc7a85e1bc6abfcc93df1
-
Filesize
172KB
MD520838ff991e5e6a95269b81f56037d94
SHA18889e36f20e56b7d04c2996741bc3d925e5f63eb
SHA256ca48709248938f38e06c42ca33c0237f93b0d5b10a285830257dd70859eb21c2
SHA51276e570b61923011a87db002ac00bbed8740d345c254bab1bb743f6dddf702b324d05ca7ac65d7a1f1046928a0af488c9e0486081cf9e4a663974d361b6835349
-
Filesize
97KB
MD5a24b966ac7e1fa617b86931dea7dcb51
SHA1da89cc35ab143f8464756341ab0a92815c515333
SHA2562bd3d52846766faaf001a177b255f993c2a77409280b7851d58dae4083bc3981
SHA51237ab3b75b0be9a2bf04ade7aad86869e5a44defcbd8b58ff0a832877f0c0cd8e645fb92f5309af692787e27ac0b9f8c1ed6f44fcd35e75ec1fa52541fbbc93f3
-
Filesize
93KB
MD5082b6c2bfb6484cf5e8c1d7cacb4711c
SHA1050960504234b6bf22a69033773b5a234830b3fd
SHA2562d870421a6752a912a85dcbc522ca7da2293b61197f6583ccc2edb72b05f5be3
SHA51232053171e2755f7ca17a1415889ef7892a16f55a79ba871670357cb8791efc3ee5af17b0708a2c103690f628e50d803de45d5781774f9fbd62dedcaa6c01be0f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd