Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 06:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://help-desk-portal.com/2987e081421de4eb079b32a059b0779e64f17e54e8a18PAS2987e081421de4eb079b32a059b0779e64f17e54e8a19
Resource
win10v2004-20230831-en
General
-
Target
https://help-desk-portal.com/2987e081421de4eb079b32a059b0779e64f17e54e8a18PAS2987e081421de4eb079b32a059b0779e64f17e54e8a19
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2524 chrome.exe 2524 chrome.exe 752 chrome.exe 752 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe Token: SeShutdownPrivilege 2524 chrome.exe Token: SeCreatePagefilePrivilege 2524 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe 2524 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2524 wrote to memory of 3236 2524 chrome.exe 81 PID 2524 wrote to memory of 3236 2524 chrome.exe 81 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 1624 2524 chrome.exe 84 PID 2524 wrote to memory of 4640 2524 chrome.exe 85 PID 2524 wrote to memory of 4640 2524 chrome.exe 85 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86 PID 2524 wrote to memory of 1576 2524 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://help-desk-portal.com/2987e081421de4eb079b32a059b0779e64f17e54e8a18PAS2987e081421de4eb079b32a059b0779e64f17e54e8a191⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffafef89758,0x7ffafef89768,0x7ffafef897782⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1880,i,13613337611690005841,1236421192775978926,131072 /prefetch:22⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1880,i,13613337611690005841,1236421192775978926,131072 /prefetch:82⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1880,i,13613337611690005841,1236421192775978926,131072 /prefetch:82⤵PID:1576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1880,i,13613337611690005841,1236421192775978926,131072 /prefetch:12⤵PID:180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1880,i,13613337611690005841,1236421192775978926,131072 /prefetch:12⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4444 --field-trial-handle=1880,i,13613337611690005841,1236421192775978926,131072 /prefetch:12⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4956 --field-trial-handle=1880,i,13613337611690005841,1236421192775978926,131072 /prefetch:12⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4828 --field-trial-handle=1880,i,13613337611690005841,1236421192775978926,131072 /prefetch:12⤵PID:1036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 --field-trial-handle=1880,i,13613337611690005841,1236421192775978926,131072 /prefetch:82⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 --field-trial-handle=1880,i,13613337611690005841,1236421192775978926,131072 /prefetch:82⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4968 --field-trial-handle=1880,i,13613337611690005841,1236421192775978926,131072 /prefetch:12⤵PID:1200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1860 --field-trial-handle=1880,i,13613337611690005841,1236421192775978926,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:752
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD50c5136586bb4d220654461c9d158398b
SHA1c1663fdb774715819f26c11fcbd446e7cddd4c65
SHA256815053b576b592f2b585c782eddc30ccc8e76ab0d91ac98a99c97ed0cc55ecca
SHA512d6e0089be681d2cbcfb24f4de1d41a9a950ac598c67b61438d6f4fc544ed62f29a72ba1fb9411e59dee772409727cb74fd21f6ff500763faefe04513c78731a0
-
Filesize
2KB
MD582f5b34a582ba467a938d3a0df835b97
SHA142474c6eea75eba7b18e846640a3657d53cbc881
SHA25652f7bdd634c41af94b0f417dd788fdb446f386229b0de65c45c8bf99f7d4c488
SHA512e6b048c4d70d740f8b717608335333cbdc80d34e3012f177267f6fed5569387289eafa9b52a6fa2fd0812fccd3d43eef3937b86e38af8ef58d2ac6e6c28fdb58
-
Filesize
536B
MD597d4445ceeb04676fe81c6ac52ab0883
SHA1c2d854b61580654a18ef7348036a11a50897fc43
SHA2569668368a1ca27aad0e4aea7eacbd488e1e0908896b074476f1b73afea4b09838
SHA512455e104be27b86b2092e90e03da0eed9ccedfd2bf5cbd41d921693dcb721f7bceaa9f93a1460677a75e93302e5c206ecec5b418436af6b4d7a5f19d2f9c8e30b
-
Filesize
536B
MD5f3abfd239037c8b59d9c3f30de27b11e
SHA17a5a83f9fc4976a683b5d8e824cb2955cc60accc
SHA2565ec38b3d7e8b2516f011fd2b109913f4356433c23f74187a9c8990e0ad264ac6
SHA512e6e049b6c7d75f06550601b7021ec18814ea0a83e597ab2d287140ac79634c904a926631e5673a3711efb07a339a039d80cd9771b76adf9851136443b490f43e
-
Filesize
5KB
MD5a479aeae6652d49ad0ee2d06c2807f3f
SHA12f9b165323eb87143240b05b2e020da9c22ad903
SHA2563b8a4a8ce7f59d18e0db6e5958ba3be500db851816c8e5a1b187f42fbc946bb6
SHA5120cf245946b4cf06973f12eea9aed901a45bbdd62aaf59f4586853517b9bbded81ee3e820443f0e1ff30a94493d43af1dc7687898fa39e8c056736e1dc98fe067
-
Filesize
5KB
MD52315378291d7130f56abee2ac67fff9f
SHA1d0264da51fc072a63851452140abf582287ca81d
SHA25611f1f0744a03dc2a7a21cdbc4e29e60e8f143c5d931d8067df15dcd228d29ae0
SHA512ab73f63336628a4cceba85a42a46ff2b932456fe539bca475ee59ccc6d0745a22fb0d8f47fb52006ecab64ef44a16a49a5c39c782f61726a2957b41d13233cb6
-
Filesize
6KB
MD572723ed460faa2b8ab268b9189f2d0ce
SHA10300fb5ce52ec6bd534373b23274e67bcc72e136
SHA256bb641a6cc08d7bcc9d2fba595b8bb0f20cef291b9ec209cdffe2607ba3b23b5b
SHA5128cf98fbabe7da2d43792b6a4c29e1ad053d5c90cb8370fd5f492668fe7391c701fc338c1547020d8f74032100de00682191cf9b82886af9b3e73ffaa00bceac5
-
Filesize
190KB
MD5a4e2334d63ce28dcf82b03b16753f755
SHA1fe9310b3bbe24063017d49d8b39585dfb0b764c6
SHA2567fb2819521acbddb12ed70b5618c2f12bd63ce4e1e377fecc2ce7adf44612d32
SHA5129a8a85c17dfe46c262863bb402a436474b96741f9bfa62964d57ba6a3439a5249ff25d6542e15707222d0de23c2608eee8857e41a56f3ed2d56c0342605000c4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd