Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 12:53
Static task
static1
Behavioral task
behavioral1
Sample
0_0_13037_5090314_md.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0_0_13037_5090314_md.html
Resource
win10v2004-20231222-en
General
-
Target
0_0_13037_5090314_md.html
-
Size
139B
-
MD5
ac08a348178e9f3598bd164528125072
-
SHA1
2c8ff5f8ffc3b487077de6bb2b42a46564d3a07f
-
SHA256
33b684ff50cfab28079c9c9ab4ca85728caf3d12eb0f3e1f3d1dd9842184829d
-
SHA512
66d26d0dbef4786a91322d3a31b01d7ea884c690007fbabfb5274cddf345149f9e6d4461f063cdac42437477f2709ccb9a297efd9c8fd55edbca604f96aa02e3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133523024152451976" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4268 chrome.exe 4268 chrome.exe 4304 chrome.exe 4304 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe Token: SeShutdownPrivilege 4268 chrome.exe Token: SeCreatePagefilePrivilege 4268 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe 4268 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4268 wrote to memory of 1464 4268 chrome.exe 18 PID 4268 wrote to memory of 1464 4268 chrome.exe 18 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 5000 4268 chrome.exe 58 PID 4268 wrote to memory of 640 4268 chrome.exe 59 PID 4268 wrote to memory of 640 4268 chrome.exe 59 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62 PID 4268 wrote to memory of 3668 4268 chrome.exe 62
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\0_0_13037_5090314_md.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffe89af9758,0x7ffe89af9768,0x7ffe89af97782⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1872,i,418457667635426584,8231064708476976291,131072 /prefetch:22⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1872,i,418457667635426584,8231064708476976291,131072 /prefetch:82⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1872,i,418457667635426584,8231064708476976291,131072 /prefetch:82⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1872,i,418457667635426584,8231064708476976291,131072 /prefetch:12⤵PID:4332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1872,i,418457667635426584,8231064708476976291,131072 /prefetch:12⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4516 --field-trial-handle=1872,i,418457667635426584,8231064708476976291,131072 /prefetch:12⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3688 --field-trial-handle=1872,i,418457667635426584,8231064708476976291,131072 /prefetch:12⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 --field-trial-handle=1872,i,418457667635426584,8231064708476976291,131072 /prefetch:82⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3328 --field-trial-handle=1872,i,418457667635426584,8231064708476976291,131072 /prefetch:82⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4936 --field-trial-handle=1872,i,418457667635426584,8231064708476976291,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD53545bdd8a4066da7d91e361c652b9f72
SHA1d1fb57c0eae25d3610e1aa707ae175ee106d46d6
SHA2562b308065cf14d0e547a5436cc23c0de9a901ea9ffa75ce44bda11865847e0412
SHA512d7da93d4ff835e36ebfcee21f446a985282cc15f4732a29301a157832bad12b2cdb79b0511bed0493db3b4f44c8f3f332bed8b0852652059a2012940755d0eb3
-
Filesize
2KB
MD582809b1e01f8dd6ad38122c2824033f6
SHA1b9d304e791616c3ef94f5b88e85db697172f651f
SHA256dd6f4643171a5d2cc00dc21b9256698baa420c352dfb8772abdaa709d90b9c1c
SHA51218a1387fb9b135cc4a7a85626e41f32c4e62b8b076e4d327dba0f92e5310ee3512066e6c15dfc95fbc2d8c4149b8f2ba998cf224affe16a652597b60e76f2d14
-
Filesize
1KB
MD5e1cd63325d9f3a2a4220c6cb5a406187
SHA18d78ed40931a012768d73e75f4297ed9cefd4866
SHA256973c7099d08ac72262a15d4dba8c23386f9c0220a1bdc8d20e7e78c0d9d90a3d
SHA5129d924d0ffc6b720274e1f7c82f782cef976f264f289e046c98ee5f722946e6e13626bc151d33375a110bd0187188cb2f6e382754dd535186d016cb32c3b8b063
-
Filesize
538B
MD5f659257d87b0fb7275abda0bce3b6a6b
SHA1579b0b9d02fcb4c4ed87dc162c3c307ecb044e24
SHA2568e8890393bcfbc565dda8a478612d00df07c6d39e2db5c80af4cd0c2d40761de
SHA512d219e79ad67a9246b11b31c1fb40048bdb633a41699ca58dd4690f81719b90cf68c1850f1960f942fea7d8e30e8eb7b0f8e92f87da1512113f6402f4641146da
-
Filesize
6KB
MD50a01e1b36f48cb506020f24828452c3e
SHA1c6ea6fec2206f665f49ad7fd8794c1ca8351411c
SHA256d8088a510cf0b4f87a70b09610e7f4ada4650bdfc9f2bfa38504bfe557608e88
SHA512bd710df204c6daa6b40892a12eed20cdfa95a653b75e69597d6d70d580695d9858b45231bd96c9bfe898a7fce1ba5271971f39c1b659034d38b0a8bf24aff3d5
-
Filesize
6KB
MD5fd8ee029dd660b198a2e1c8ef940de6e
SHA1cffa1f384c62afc889c136551c1b212be157decd
SHA25696e009a6bf0724b214ddc68f34daeea115eb9b8d482b8171db0786811a00dc1a
SHA512d75461df5fad3b2d56330c7ca13494827a835a3bdae57e6a6f9e0970c2c555d2c90868237478c3f4288ed11a5ebb70da7cb4bd856b924af3c1afaafef2cb077f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize120B
MD568048412d515ab8cd48a8ea4fb92ec03
SHA1c9f24045943cb6a9b37f3dd3d9e1b2a97f65f90d
SHA256fb850a921acd790c59ddc96aa7a892eb809e54f20ecda7bf16cb374cab744661
SHA512db3baef02ac7770161ddd71a6ee91f035306a4ed61b576d6d47c0255cbe2db3b79205d5fa83359e410fe22aa82b16846333f2df31b80290e1a8de4b669af5955
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57ade3.TMP
Filesize48B
MD51e9df9face84849600b2354ea2a0898a
SHA19c00267338e324ea2c88066ec5623c144e71fd62
SHA256cf065b9ff7df34401f4ed00f5112574eb80b279fc3d1ba97598a38b9888cea2b
SHA5123b6b945579a693f37c7a7e19505eb00f760d4019c8f4c3653fe6eb7c1dd6e939df089f41ecf7c439f23a3bf2ba5e165335de56635af6726faae818b1f812a1dc
-
Filesize
114KB
MD5eae75ace477f51bb78a57ad62b8cce60
SHA1824f0ef3ad0e68921db0686fd27412c38186925f
SHA256ab99708cc1c95a53f005f71b22d654475c18b56e2bd15362721b2f57ef2fb09d
SHA512a6f84143c2906083d2889b54ff758a7d37655292cfcc031278571b84281dbe9cd2e32760bde02e994f0af0149202e2af0f7b9f6178a96ee47829f0e0ef722715
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd