Analysis
-
max time kernel
1805s -
max time network
1695s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2024 15:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://h
Resource
win10v2004-20231215-en
General
-
Target
http://h
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133496335340614482" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 3136 chrome.exe 3136 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4776 wrote to memory of 2492 4776 chrome.exe 41 PID 4776 wrote to memory of 2492 4776 chrome.exe 41 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 4404 4776 chrome.exe 90 PID 4776 wrote to memory of 2728 4776 chrome.exe 91 PID 4776 wrote to memory of 2728 4776 chrome.exe 91 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92 PID 4776 wrote to memory of 2852 4776 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://h1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91a459758,0x7ff91a459768,0x7ff91a4597782⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1880,i,12013897172241009682,3767278344568449844,131072 /prefetch:22⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1880,i,12013897172241009682,3767278344568449844,131072 /prefetch:82⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1880,i,12013897172241009682,3767278344568449844,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1880,i,12013897172241009682,3767278344568449844,131072 /prefetch:12⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2928 --field-trial-handle=1880,i,12013897172241009682,3767278344568449844,131072 /prefetch:12⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3732 --field-trial-handle=1880,i,12013897172241009682,3767278344568449844,131072 /prefetch:12⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3920 --field-trial-handle=1880,i,12013897172241009682,3767278344568449844,131072 /prefetch:12⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1880,i,12013897172241009682,3767278344568449844,131072 /prefetch:82⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4516 --field-trial-handle=1880,i,12013897172241009682,3767278344568449844,131072 /prefetch:82⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4800 --field-trial-handle=1880,i,12013897172241009682,3767278344568449844,131072 /prefetch:12⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2624 --field-trial-handle=1880,i,12013897172241009682,3767278344568449844,131072 /prefetch:12⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2168 --field-trial-handle=1880,i,12013897172241009682,3767278344568449844,131072 /prefetch:12⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=820 --field-trial-handle=1880,i,12013897172241009682,3767278344568449844,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1072 --field-trial-handle=1880,i,12013897172241009682,3767278344568449844,131072 /prefetch:12⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4764 --field-trial-handle=1880,i,12013897172241009682,3767278344568449844,131072 /prefetch:12⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1976
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1608
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:1780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5a18c08b259ca6cbe1a40541bba61fb59
SHA105dd500714791d21521f6efcebf1e7092c0fc8d6
SHA2566cabe5d8f76ca98616fd860d6566c55492476e04012e72e27ce3e1e81e955650
SHA5121cea0a410ee17d59806e634ac584b88397732012dfc6eb53c3880e227108c51de2cc62095775d31290ff49e1a90dab3c789b113c5af8a2985fe4e03336565a1b
-
Filesize
1KB
MD5021b3b3e4b34221f9d498d5e63eb019a
SHA14d131e87755e7f6b6e24ff3d94f0f8b547fb450e
SHA256c2539c752be876eaf3ffaed32f0cf0917968f491bdac83c60cd6ba4777dff822
SHA512ad70cfa8a3c351d79b1ab1c6c52885f0054fdef3b6e1f459675cf2efdcde57144b088ffb7682a9a2856c1aa4bb5ba7cf0bb333ffa95d440cb68c8e65327c8996
-
Filesize
6KB
MD5454baf30cdb777999b53698e32340ba0
SHA1ab29ff362664f6cc53d311e0c765e24b8571d14a
SHA256919280a799b9518773549c4cdede930a2f3dc0fe9755f0e76b3d1f57aae97338
SHA512f95ea06ffdca9aa1bef6ad0fdb683404655d70e76d9993840dc59a2e1c8da2c802f8b7b911508688eae3beca18c93be9ec05d6ea78f5375ad6f28a4f097e13cc
-
Filesize
6KB
MD5e3fcc8a084996d33a143f53b848bbdbf
SHA194ea575fbd749e3c4c743cf9f70fff49aea9393b
SHA256511c517448a9fde39f99f5f25a46c8943b2dc6b1aaa68cb0725a0cd9dcab3a74
SHA5125bf9e27d3464c07078281b763aae4596e36d560a00c3f988b2fff7e018d94d204e01bab8df958207d21a35c0e97b8ecd3087d85683332cc1a147a2525c9fa7e3
-
Filesize
114KB
MD5cd538b5db4018717f0fdcf2c3a56e709
SHA1a684658085be41b7d4cd91ad52871171f9e3e26f
SHA256e459b71d4fac3558b7c9191d73e7987059fbf875fdadcf2f2ec60a8496b9ebf1
SHA5127866e0588ef87460fd24f3cbc3bbe6549f04e085607fb75abec0f7cc6c84f3787b708f9c3cee2e94d09c6870a3d12c47c21aa5aa2e8fad6823f8015b4d5f0bce
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd