Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 07:44
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pmm1s9kbbrnvri3wzakf.jcj6buf.ru/q1mu/078nS1QRkobHwE9SP3OZuvx1iPXH9MdfP7ARe26rOZSQH81l4dMV6ni2sAC2B3Ge1ohQE74hNmW4Q9tIRDdgUG2Hn7w?id=b3R0by5lcm5pQHZvbHZvLmNvbQ==
Resource
win10v2004-20230915-en
General
-
Target
https://pmm1s9kbbrnvri3wzakf.jcj6buf.ru/q1mu/078nS1QRkobHwE9SP3OZuvx1iPXH9MdfP7ARe26rOZSQH81l4dMV6ni2sAC2B3Ge1ohQE74hNmW4Q9tIRDdgUG2Hn7w?id=b3R0by5lcm5pQHZvbHZvLmNvbQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133415703584904644" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 820 chrome.exe 820 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe Token: SeShutdownPrivilege 1804 chrome.exe Token: SeCreatePagefilePrivilege 1804 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe 1804 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 216 1804 chrome.exe 52 PID 1804 wrote to memory of 216 1804 chrome.exe 52 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 4720 1804 chrome.exe 85 PID 1804 wrote to memory of 2716 1804 chrome.exe 86 PID 1804 wrote to memory of 2716 1804 chrome.exe 86 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87 PID 1804 wrote to memory of 4140 1804 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pmm1s9kbbrnvri3wzakf.jcj6buf.ru/q1mu/078nS1QRkobHwE9SP3OZuvx1iPXH9MdfP7ARe26rOZSQH81l4dMV6ni2sAC2B3Ge1ohQE74hNmW4Q9tIRDdgUG2Hn7w?id=b3R0by5lcm5pQHZvbHZvLmNvbQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4a159758,0x7ffc4a159768,0x7ffc4a1597782⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1892,i,17716680474769413632,18282526995440811560,131072 /prefetch:22⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1892,i,17716680474769413632,18282526995440811560,131072 /prefetch:82⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1892,i,17716680474769413632,18282526995440811560,131072 /prefetch:82⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1892,i,17716680474769413632,18282526995440811560,131072 /prefetch:12⤵PID:1404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1892,i,17716680474769413632,18282526995440811560,131072 /prefetch:12⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4816 --field-trial-handle=1892,i,17716680474769413632,18282526995440811560,131072 /prefetch:12⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 --field-trial-handle=1892,i,17716680474769413632,18282526995440811560,131072 /prefetch:82⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4804 --field-trial-handle=1892,i,17716680474769413632,18282526995440811560,131072 /prefetch:82⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3748 --field-trial-handle=1892,i,17716680474769413632,18282526995440811560,131072 /prefetch:82⤵PID:3828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1892,i,17716680474769413632,18282526995440811560,131072 /prefetch:82⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1892,i,17716680474769413632,18282526995440811560,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:820
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f886294bc1c9f6295f44c2e947b30345
SHA186625268312adb2a7b2cfe71fffb10426e477d23
SHA25639c634112ebd99d5766b5c8f81e226570491b1dafad4a6b13eb1b9b7925e2f6f
SHA5120daa0d2ea453519dceb748248c712dd7b917886b33a85eeb5eecbbffcd159859006cd56569c96acd652e951bdd75d7435a552fead77c66a2fd11d18658f4f520
-
Filesize
5KB
MD5c99f513ef503a1a5405af67a37251184
SHA12ca61827a5aa48b46fb04692a7472a04c8d4870c
SHA2567bc52d7754d0d240924b7b891e40fac3432fb1d809183e45e3cfdb6379ea74f7
SHA512faea74b085e1c0d3301ebc71e6f903aa7d4aa0a25c8c3b1ce2e2eaa669a26a7d9b9062aec4c39f6f731fc1a7e9dcdcc822644d0a336c9ba4fac06ce75df07f61
-
Filesize
5KB
MD521655b3305cf62b0b0b849d7cb1180c7
SHA18b510ef8965a76b9fdc97b213ebea42b1a6836fc
SHA256a835080af31bcb85a124b682b20a5de2beed5d5fb5e5811abaf3390ded039be1
SHA512ef46b8a06ab1b52878992a017c24b2b195d647151464f47ad79db6c9231618e106cf55aeb7769eaa55c2e03ca90be75dbf1a3ba1a6156f696cf9eeaa66ff9220
-
Filesize
6KB
MD505bc0abf98fdcbd21e8dde687ee14612
SHA1e6270cc6a3ebc9782d8230f8c1ccc57aa6fc4899
SHA256324f8f9fa21f6a713cf69008c425a361139777e584ae1ca04d21d77b33e4ffa1
SHA512395b472b07ac7cdd33ef72a17313caf4dee7532bf4e7de0b62455bea90316d25b57f10035de805f6d470c9ad4f70cdec8c1b22506152cfbba3b9afda8c0224c8
-
Filesize
104KB
MD59cd12f30a21f4f5ce0c3109ac9c9ac27
SHA1d756d217e96410128414f3e551f3420322ecdbbb
SHA25605614591280bcba3cd2a5203f6005f25b82f16a64f024c9f8953a9f52efc5dc6
SHA5120e1679b00eacac86fff428cf6d475cf0a648ff048e49c755d8d6aa54956b493893f689010575cc83b9d195f7f1c573871b7b25e6dc6ad1c99fcb55b1816cb008
-
Filesize
121KB
MD58e60fbc0070cd6bd2d3439c37df9c2e0
SHA148289351dc8efd311c1f41ff7fee60c4e761e262
SHA25635b601bcd17af934dfd4d648a914e0e2933b577d1ae160ae0bfe98602e054b64
SHA512559f5f4d5352091649b9bbea12358e4c686751b45c542d0bfb29babcb13d9294b8276a8fed1a2ff0cfaae43b547c9edc08127efb348438bce3b417026cede7e3
-
Filesize
103KB
MD5088dce88bc99821c8665ba8b232e486e
SHA1e7a4354cd2fa13f4e99801096ded97fdebf534e3
SHA25659f9843211095c8eb2802c849fa9255dcf4162e9419e689caa41aa7c64d75a82
SHA51255eaab8cc0cac386ef2d55804f3d1821eec82a7f7cd973172ff4b47be814985962c33239dfde1fe709fb175a23e3494857d885bfff78afe2739ade3f8419803a
-
Filesize
103KB
MD5c09cb46bb99f65eac70eba6c698df3d4
SHA17cdb5a493242cb8e97a2df52fdbfd95f2456f888
SHA2569fd82eb55831259a44d87e066b712dfb98aaaf087c61d53e87949bcb489cf27c
SHA512cd11edb772071c47b6e532f3093a163ba59e1632fb8adbc40d3e29f9cd22dfcd14d14b6ced5c57bd45645210158fca3927f30a87ddbdcfcffc28c6ad9bfdc745
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd