Analysis
-
max time kernel
183s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2024, 04:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://module.ftpimport.com/modules/simpletest/tests/psr_0_test/lib/Drupal/psr_0_test/Tests/index.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://module.ftpimport.com/modules/simpletest/tests/psr_0_test/lib/Drupal/psr_0_test/Tests/index.html
Resource
win10v2004-20231215-en
General
-
Target
http://module.ftpimport.com/modules/simpletest/tests/psr_0_test/lib/Drupal/psr_0_test/Tests/index.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133486450810379300" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5060 chrome.exe 5060 chrome.exe 2196 chrome.exe 2196 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5060 wrote to memory of 3108 5060 chrome.exe 87 PID 5060 wrote to memory of 3108 5060 chrome.exe 87 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 4176 5060 chrome.exe 89 PID 5060 wrote to memory of 220 5060 chrome.exe 90 PID 5060 wrote to memory of 220 5060 chrome.exe 90 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91 PID 5060 wrote to memory of 2940 5060 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://module.ftpimport.com/modules/simpletest/tests/psr_0_test/lib/Drupal/psr_0_test/Tests/index.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6c829758,0x7ffd6c829768,0x7ffd6c8297782⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1888,i,16840754084049454914,3283499701495099472,131072 /prefetch:22⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1888,i,16840754084049454914,3283499701495099472,131072 /prefetch:82⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1888,i,16840754084049454914,3283499701495099472,131072 /prefetch:82⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1888,i,16840754084049454914,3283499701495099472,131072 /prefetch:12⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1888,i,16840754084049454914,3283499701495099472,131072 /prefetch:12⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1888,i,16840754084049454914,3283499701495099472,131072 /prefetch:82⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5136 --field-trial-handle=1888,i,16840754084049454914,3283499701495099472,131072 /prefetch:12⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 --field-trial-handle=1888,i,16840754084049454914,3283499701495099472,131072 /prefetch:82⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4800 --field-trial-handle=1888,i,16840754084049454914,3283499701495099472,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD54b4e82a6033326f7fb68317237fbf571
SHA164a1b851232934a877114692c3ebea1ece30beb6
SHA2569300bc18fc73ce9e03794b297a0d0879b0159d7df3f6c65a116b803b5f5fd0c8
SHA512888143aab6297aef569edb96c594636168386d60cba1e97e744e3d40275e63f1873b0316e6e85805224d19840342db85576f91878af840fc10a1cf780d2faf33
-
Filesize
1KB
MD50bb96d595b4b72f56749ee5b53287cf1
SHA1943d4cf76639cd2c18a8618230606f1121fad1fa
SHA2560431952bb5d102e91c0b10903777d02695b3e050820722843c17d70d63e05135
SHA5129c67f9139ebdeae431aa7cfcde0e0fc5ee522ce531e0be4ea404bc7b0648239b4b1395abc8632d9f023804a074fbb7197c58db32d1b1938cb4743ed7d901e5a8
-
Filesize
1KB
MD5711d8d43c50993bc76b8107c6f84e4c0
SHA19a95dd9bdb8f05110aedb97085e79900508cddc7
SHA256890694608123a35c9aa553d5fa1d02c6954ca1597fa6f8d4f3780a2d2acfd8de
SHA51209674c517b2752a0eb72108acc2a599aa3b834710a7becdf9a86296a82a150cc4b7fd59e5cd8bf95cb081cab30ac8b1d6afc27816c6a18cd5703539b86a52130
-
Filesize
1KB
MD59973756b9c347f01e588411b0ceabd16
SHA1e9d544f68a664f41e1ef018e114c6d228f5714de
SHA25651f628e5ca1d00a432edbb98ee5b2c711f8e69bdf08719b4f0b88cac71aa28be
SHA512b60af3d8cea612e2967d6fe5f08b5335735a635e6a1af61c8d84897ff0b6c16b17c7aea4be9c087f8cd216fe4d98b2a668943ce4e49478f8fc9c24d0f90ca461
-
Filesize
539B
MD5ba19ec8753575c0f77e2b69c23aa4eed
SHA183305fa4b853f1f608ec831ba75c81860ef1fdef
SHA256ccf2eb8c4419bf6931b49a8ae90469268e28b7973c99c4efcb06547e5c670861
SHA5125ebc8d3e84b546903df9db336547175382713bbc912e04d633a68b528cd3694dca7b4ec302adaeea1e17e7bd2ebcb40741f3ad603756055940fe9e08ad63623e
-
Filesize
539B
MD5c3151f81accd02e4506306749c572bda
SHA109da2d8ed094e1618077989e9a3554dcc2a72bab
SHA256de1949d5479acec79636854c37621428ad6003bf1d2a7e12c99ac854d508b7e8
SHA512315893efdf68449e91e3a3425bed760a02ec2bcd99c5da94bbb6d385090d4aad6ca0057f348de03d6d6f904c9f52eac6850c3e022dad72d0d27f83523072e19a
-
Filesize
539B
MD5386e06404840d2cb7359f80047672ac5
SHA1d40947e560d6b51bbb81bbf2f141012e9d57d4ab
SHA25694fe87bf67e20363fa42268579ef9eda686536dad44e857ac0d152fc43030599
SHA512af6f9204de1861124416260e7a7fd701f1385196868f29be12c335133bf96fb93cb03a0478c0504bb17f54587cf35f3bbfb14b6478c8a2ec13d053f74048e2d9
-
Filesize
539B
MD555fd92c4343654337da1747b40531975
SHA14847a9f70b0f638ea36cb0aebcb936fdbe911d07
SHA256ac26d4ad4b0d7a01f5b45f5fe8d231983bfbffa728a1b8fb8c9bcbeaff51a4dc
SHA5127bb999c382b9c54981f4e165bc1baff736aefc20ecbbdb18792ae5e667474022b89633e899ee865d99998d99126531993615d5c8640b2eef59738f9da8458162
-
Filesize
6KB
MD5e4c68ac7b4f360a734300580dd1da95a
SHA1af90f39f4a764ce23daf60f2e50ec6615f29e58e
SHA2563f9cf073e8459e76d9c4514b60119f77204cfd92b525913a95d49b1215c719bd
SHA512c05b0aecd9c3339cf76474eff6730d4cb1009378d78b6ec5d0ecd04a99d03d27ea9c687c1e39172394e8bcca0ee34343e84b1528fb2cce388ccc7937363208d1
-
Filesize
6KB
MD5f9a926de1da08dd8948bcd4f4676ce3d
SHA18b72921542dff0b1cb7ab8a89e40fb12ce1e91c4
SHA256d0374cca9bd50c2c730cb787e1b8bf81f8d2270a78f6a8b1f8eccb2397cc560b
SHA5125f10d8325c66ff253bb472ad35d519ed3561e6bb36036709f937a0ed989b6f63e7498db1e760e6810fbc94bb72e8184f5f411df127837b9696ac9adc3ebc74cb
-
Filesize
114KB
MD57861f55f1dd0c31514019cb4a5c7ecff
SHA1679c057d7513a4ecd65a34dba37359797591ba02
SHA256dfed9732048bc549be6395fed29d32e9032afbca983bf7c17fb8334a65de8b17
SHA512ff2d55f40a518d5b282a0ec4490d5eb45df29e01ad1d2cb94a3e286d5ce6840a8d180393c8348b5e5d2969846a7e56b6e6f9d486b1b43d1d6a7f5afc127755a4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd