Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-es -
resource tags
arch:x64arch:x86image:win10v2004-20231215-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
20-02-2024 18:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://200.119.142.10/phpMyAdmin/scripts/setup.php
Resource
win10v2004-20231215-es
General
-
Target
http://200.119.142.10/phpMyAdmin/scripts/setup.php
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133529289509821333" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4196 chrome.exe 4196 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe Token: SeShutdownPrivilege 4236 chrome.exe Token: SeCreatePagefilePrivilege 4236 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe 4236 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4236 wrote to memory of 864 4236 chrome.exe 65 PID 4236 wrote to memory of 864 4236 chrome.exe 65 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 3368 4236 chrome.exe 87 PID 4236 wrote to memory of 4956 4236 chrome.exe 88 PID 4236 wrote to memory of 4956 4236 chrome.exe 88 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89 PID 4236 wrote to memory of 912 4236 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://200.119.142.10/phpMyAdmin/scripts/setup.php1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2b149758,0x7ffb2b149768,0x7ffb2b1497782⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1892,i,5876620577123052091,11988478607751387483,131072 /prefetch:22⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1892,i,5876620577123052091,11988478607751387483,131072 /prefetch:82⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1720 --field-trial-handle=1892,i,5876620577123052091,11988478607751387483,131072 /prefetch:82⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2904 --field-trial-handle=1892,i,5876620577123052091,11988478607751387483,131072 /prefetch:12⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2896 --field-trial-handle=1892,i,5876620577123052091,11988478607751387483,131072 /prefetch:12⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4860 --field-trial-handle=1892,i,5876620577123052091,11988478607751387483,131072 /prefetch:82⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1892,i,5876620577123052091,11988478607751387483,131072 /prefetch:82⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4996 --field-trial-handle=1892,i,5876620577123052091,11988478607751387483,131072 /prefetch:12⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3152 --field-trial-handle=1892,i,5876620577123052091,11988478607751387483,131072 /prefetch:12⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5788 --field-trial-handle=1892,i,5876620577123052091,11988478607751387483,131072 /prefetch:82⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 --field-trial-handle=1892,i,5876620577123052091,11988478607751387483,131072 /prefetch:82⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3796 --field-trial-handle=1892,i,5876620577123052091,11988478607751387483,131072 /prefetch:12⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5868 --field-trial-handle=1892,i,5876620577123052091,11988478607751387483,131072 /prefetch:12⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4716 --field-trial-handle=1892,i,5876620577123052091,11988478607751387483,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4196
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
823B
MD5784f1dffcce70baa768f527686d9f882
SHA1390fa3315fce3ac3cf99b8e5cb1ade9112b67c9a
SHA25684439ce5172b37107384a518d2d12d018c64ec01f10039a6bb5d05958a1679df
SHA5123e95208c5c52a28e5d0f819dac523fd48f730760886bf6564b9b3083896d490dc1e348c41c6d6ac10c175f9a1e09910f0b7fbc267617a932ce0fc9087a7443cd
-
Filesize
6KB
MD515772a69f4df31cb3c30cd1422b6130b
SHA16d2dd3f36c16fe26eaa6d69d4be5f32912e3eda5
SHA2561e4dfc03a904b0982d2c155b157d8400e0f15e75e2599f6f4ac8ba1174d4f905
SHA51256c694966785fff73f9018989b166b326f9950bba9e7d8aac122435908b53b560c911626875f3f2b41fadcac4ee9f8851ad0ad063e62f8d80dd72e02b2e736e9
-
Filesize
6KB
MD56c4e57b21a2e7c015a84934bf42750dc
SHA17cd6313b100800405693aab03fa1ebf8eea77bb6
SHA256844ac493b64be507689fd256cd99664a1b1b4c050a231983535adc475b527049
SHA51233cbf50eeec0c4e6d4e8cd90dc8f6dc0483cbb531e6a8a8d86707a8e1f9f034995b6c8ef01620aab0a4a9f7590156a6ced8df55ccdcf273a1d61b2c4238bbeb1
-
Filesize
135KB
MD5f8bbedecbd16416b5ddfc113eedbcc03
SHA13c283224167ff6b56d34bec19277dccfe8d62faa
SHA256f06f1f036eeec1c74bcf60aba00eb8387bb4458552328b0d844c5656cd9cb617
SHA512bf93e668114f393e7bc31d51c12221cb2a5d7d950705a7f15ef29440bfffadb82f299ee5c7a699e97667141c719fde3d25bbfa3746b3533b0bbb412bbd53713d
-
Filesize
115KB
MD506300fb6acb53aff13563029ff31a103
SHA1250fca3076bdf8940b609685a155fc8311b88fd7
SHA25650404d8722b0a9aa02da05c55e775b11c437f0ebd4df1850709c6ac7c212c496
SHA5127841ce724b33b70a0a4befd334922b24bf89495de0a18b566c52f8cbf7b0e0416e3aafc560a99585d0ac4cfd80dffa2db03c4b5b4428c19099319a3991d8c74c
-
Filesize
115KB
MD525a36a40ccbc773563024f9a575ea575
SHA1f9061098a1aec78745b890744ab2fb36450feffd
SHA2564456197a5d99049ca23da3e733644266796545a4bff271fbfccea97cae3be0ac
SHA51261948dbdab3df1ff070a103f33ec84dfc81bd7429c725ba90e0d661973bd1e400813b04d1c8bb25ced83928f97e970c9a58e06b046bd1020ae6aa95702e34d96
-
Filesize
116KB
MD50955520ca5b33ceea4630c8b580c5dda
SHA12472b6743c4053263268b5cd86b390c3bf3e857e
SHA25689dc067525f8a47d92b1acf149e31751e10071877eb381f1f991c92449952528
SHA512007d5cc03cfd5de74fb49608de4044fc7c7189c09f00cc2aef8f3c569b04a3ebff73a9a00b55c92354196ad3b0794e812d1bc4613515bd0f7e56190b524b40c1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd