Analysis
-
max time kernel
618s -
max time network
509s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 07:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://71b8620f.sibforms.com/serve/MUIFANBxQan818xsadlyDKVRyfLKrTwNuYlCHYcqMzh0gDqkqSPjZG78gYGx8ZXSb3sLtvuajKuYjx1ijwt7HTByGFp4A3tlK4w1utveriNyN3ZHlQBaIvXWyKEKvHUOfeeBZJIw5LoQFGqrEHErHB99lZvQuH0Q-s_D6RGKEEownyIkFUJ2vuUSEbOr0g0o-8Jlz5t7ZTOw2HMj
Resource
win10v2004-20231020-en
General
-
Target
https://71b8620f.sibforms.com/serve/MUIFANBxQan818xsadlyDKVRyfLKrTwNuYlCHYcqMzh0gDqkqSPjZG78gYGx8ZXSb3sLtvuajKuYjx1ijwt7HTByGFp4A3tlK4w1utveriNyN3ZHlQBaIvXWyKEKvHUOfeeBZJIw5LoQFGqrEHErHB99lZvQuH0Q-s_D6RGKEEownyIkFUJ2vuUSEbOr0g0o-8Jlz5t7ZTOw2HMj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133424320067080648" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3620 chrome.exe 3620 chrome.exe 4824 chrome.exe 4824 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3620 chrome.exe 3620 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe Token: SeShutdownPrivilege 3620 chrome.exe Token: SeCreatePagefilePrivilege 3620 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe 3620 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3620 wrote to memory of 1264 3620 chrome.exe 86 PID 3620 wrote to memory of 1264 3620 chrome.exe 86 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 5040 3620 chrome.exe 89 PID 3620 wrote to memory of 844 3620 chrome.exe 90 PID 3620 wrote to memory of 844 3620 chrome.exe 90 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91 PID 3620 wrote to memory of 4152 3620 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://71b8620f.sibforms.com/serve/MUIFANBxQan818xsadlyDKVRyfLKrTwNuYlCHYcqMzh0gDqkqSPjZG78gYGx8ZXSb3sLtvuajKuYjx1ijwt7HTByGFp4A3tlK4w1utveriNyN3ZHlQBaIvXWyKEKvHUOfeeBZJIw5LoQFGqrEHErHB99lZvQuH0Q-s_D6RGKEEownyIkFUJ2vuUSEbOr0g0o-8Jlz5t7ZTOw2HMj1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff978c59758,0x7ff978c59768,0x7ff978c597782⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1860,i,3503253430454949478,17946626402987520191,131072 /prefetch:22⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1860,i,3503253430454949478,17946626402987520191,131072 /prefetch:82⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 --field-trial-handle=1860,i,3503253430454949478,17946626402987520191,131072 /prefetch:82⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3224 --field-trial-handle=1860,i,3503253430454949478,17946626402987520191,131072 /prefetch:12⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1860,i,3503253430454949478,17946626402987520191,131072 /prefetch:12⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1860,i,3503253430454949478,17946626402987520191,131072 /prefetch:82⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1860,i,3503253430454949478,17946626402987520191,131072 /prefetch:82⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 --field-trial-handle=1860,i,3503253430454949478,17946626402987520191,131072 /prefetch:82⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4052 --field-trial-handle=1860,i,3503253430454949478,17946626402987520191,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD523c93aed9b0749df9db9470667c4169f
SHA1204518912529fb2c57e9ea8f6b0c3b200ac94125
SHA2562346e9e1c0104ffd56dd2a49f87153123fb92b19cc8338628cbc3a0f99af9ec0
SHA512731fc5b6c387cd9783622af5fc0dd77e82b2eb2af943c2af576f8be5514456c19c0d279882548e8bf6c29235f3ee46f7edd50f7e3edd59291432ebf024530e9b
-
Filesize
2KB
MD5b6b89b6fdb15d34d9d6206745234452b
SHA1e9ec00b669b1563c5eec0021803aeb357baaa1f4
SHA256f89bb095964eccea8112d256248a81a9bee7d7ccfb2c0f22e2e6d664319b46db
SHA51235c0d4baa47ecf351f8c3103a62e7ce3a497d6da0307d37839644df5ae67d929a8f343ecbef72d63560b1a611220f7db626a1f702781d77227f67ad9f6496781
-
Filesize
6KB
MD5248960d4556487e75026abbe0450428e
SHA1951c6cdcb0eddc20725dc407027357b8da107fcd
SHA2566ad8d95075a02a5b36dd4780597157ee57fff5ba82fffdd8b17ca805e073ce66
SHA5129d87793f90dd168a123a4974103598b11d029ace0cf073ebc5c0172a7846fa2f192af34334e46fbcca2ac2db1720104244f064ae7f588ea4f3f9898cb0089e56
-
Filesize
6KB
MD53537b9487608c24f2e4edae4b17c9d55
SHA12194887022df4e37bc6082ab470a6449cc1a255d
SHA25637576e32c9d11be89f7953411af4a2eb917fff2305f013a2a88d6e3e4cb0d9b8
SHA512a22fa09aeb3b7bf04a09a60bd598ec9d50e022367a78d070063312ca91669b19de217ff18fa351888fc47c7327a2333245aa0cc0591cc30de3667df4420da615
-
Filesize
6KB
MD5831b82abbd0110d9c9ac9fba559a6cac
SHA149438c3f17eed4a2b37bc31464721571a616ad95
SHA2567351349d2a5be85a85f5fd657222ff17a93ad6014533218b7663c04f0ccd1db1
SHA512aae09807f81a0c0675b9836eaf34b67e49a16e25656a4b4a19b0c221d7dcd2efa5a427aa63539e4a536ea9a9b9ce5ac59c4dc28adfcd1457253daaba59c2ea85
-
Filesize
109KB
MD50577849f06911fc33cc04fce542c9772
SHA12f2557886986a71d680c4ef740c61419239de2a4
SHA256cb37c5ec373de39164f4034880c0f736d4e1d77538b96cce57e321acbffc8c32
SHA5124c0903b1a08e2a442d4a3d82e13f87428b0b6324ead7c0e92dfc353f3d0009b39f5a3b012640d140fe01c99dc6d1b4ec3bdf3b8c11c7a54ac5902968df74f953
-
Filesize
99KB
MD5635fef1fd00946f4cb9c810ef83d6f45
SHA1c99dca1c5cf395b652b01dd024216c16338434d0
SHA256491025bf8c1c128d21540f6c60916cf06f4f14231365f9f24c7017aae38c4003
SHA51203e24d95c577c337b04be40dea68bb78cd2382a920904e4e613c88d78149a9ec75280d1a19e79895a48fe13e2a5ca29416aa5b379a1e82597798704bc34614e3
-
Filesize
97KB
MD578e52c04d2fceea9b5f36ec91e3de99c
SHA1722547f18b7fd259d50b247e87dcbf1e7fd74298
SHA256993c69dc5b61b634816db751207515b4425166a033fe12a2678787dac2afa4ff
SHA512e39f144513a328d6c36cbd5cf06eab16672f6f1c11c6dec3d9305e4e383508e4c9405ec340b16cc5ad08bdb0fee405b1be99e5719fef14f2255f82a539483fd3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84