Analysis
-
max time kernel
1800s -
max time network
1689s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 18:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://google.com
Resource
win10v2004-20240221-en
General
-
Target
https://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1348 chrome.exe 1348 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe Token: SeShutdownPrivilege 1716 chrome.exe Token: SeCreatePagefilePrivilege 1716 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe 1716 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2516 1716 chrome.exe 35 PID 1716 wrote to memory of 2516 1716 chrome.exe 35 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 212 1716 chrome.exe 85 PID 1716 wrote to memory of 3000 1716 chrome.exe 86 PID 1716 wrote to memory of 3000 1716 chrome.exe 86 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87 PID 1716 wrote to memory of 5028 1716 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://google.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa1e99758,0x7ffaa1e99768,0x7ffaa1e997782⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1880,i,16886083864511616723,11286986952037853419,131072 /prefetch:22⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1880,i,16886083864511616723,11286986952037853419,131072 /prefetch:82⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1880,i,16886083864511616723,11286986952037853419,131072 /prefetch:82⤵PID:5028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2892 --field-trial-handle=1880,i,16886083864511616723,11286986952037853419,131072 /prefetch:12⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1880,i,16886083864511616723,11286986952037853419,131072 /prefetch:12⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4544 --field-trial-handle=1880,i,16886083864511616723,11286986952037853419,131072 /prefetch:12⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3648 --field-trial-handle=1880,i,16886083864511616723,11286986952037853419,131072 /prefetch:82⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 --field-trial-handle=1880,i,16886083864511616723,11286986952037853419,131072 /prefetch:82⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1880,i,16886083864511616723,11286986952037853419,131072 /prefetch:82⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1880,i,16886083864511616723,11286986952037853419,131072 /prefetch:82⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 --field-trial-handle=1880,i,16886083864511616723,11286986952037853419,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
144B
MD5755775cc8b4176d9ae5f8e56a81ed362
SHA1afdbac6902e39089e9518a98c8aab6fa3b9febad
SHA2568b1778bbc8a805e315a1901105fc9f1632a6f560f877254807487e828b6ee6b4
SHA512d7e55b40289ed8c108a2b8f99ac80744d80ce7f6f9dbdded14a3f636b5070dfc616f56e737ab282a058157682a56e84419ad116a69223b21d4341d4e119695be
-
Filesize
2KB
MD5aa1014a1cd087a9ba3261b3e5cf4b552
SHA134956bb020bf63a3f5237f686fe3f6f537fe06a5
SHA256d6c9f80960a29675a690a9d11e52cc5f5da7cf031077dea69868146056af34d0
SHA51219881c1805f7688579f4896f4f39ecb1e7ad9db77ffe0ad818ccdb5b9c2e3f9c1450edf8f0d2ad469c8230f108999fd9d05e7e2e69c5783deb9820fa8e6ca042
-
Filesize
2KB
MD56290a175d3660e8f5ab214d7240b099d
SHA1174a6c82ce2ae5e65d82c1b97b7f85bae9cd6005
SHA2563c447b71474a9818d5e4676ed6d93fb313dd72cc8a8e2ce0166b87ad96eeb2fe
SHA512a5b009ac8580cef0bb590a058494c2acb23fed20393a7ad6bd2265919a6f937c5dd12208d6b7accb6a5b02b81811567e3cf91838f25a4cde550cce53441ac297
-
Filesize
1KB
MD5fd72ac29439d16010ae1767274a641c5
SHA1d2d24d848e48ed9599596d07ebb04d6296c64507
SHA25694182edc34dfe4bed3604a6c2598226daabefe0cb196124428e49c0060950d3a
SHA512d7dbe109feb12e7decdf11f0040d2d6efe04b0e327a6adffbe4467311a1d3f3050b10c4c15168c4b7c869893b295d713ca365906c6c22fe25340139883c6fb38
-
Filesize
2KB
MD5fa585c69c31964947890fd4976697fbd
SHA195ab188f99f63bd0cd4b1a91950254e0ab4e4a23
SHA2565747ed42d6f964e03617e121e3b2ea9109623be410d2535bb8e174478fbc2119
SHA5128f3e825a505b87c34961660583d7b61fe8d693fc66815247d900731748bc5635733d838de461affaeedfa750be632d9e6b84c311dad725a990921b95d7fd986b
-
Filesize
6KB
MD5722446557939d1c3dc1eab155036048f
SHA1fa9dcae92181048235bc47f570629fece98a39ee
SHA256864fe8352f0ff737a3d5785d4683d1ed52670e6622787d12d619462b954573d2
SHA512c36ff62c4940e3991ffdd13af1023bfcea779367ade41acb015b9683844467a53fdf9c9078e2a807f8d7be896952160d098d98374e55a90ec139b924cc48a2d0
-
Filesize
132KB
MD5ec962f76220d05af07c615abc72259a5
SHA1021a9885d76c56a067938cde7de2ed8e398e8186
SHA256d4945d68a54cc9dbed0001a5ae0be6a4c09fcb79cce126ccd6826849dfbe0319
SHA512fd7966272107bd8e440e41b9aced203c71cd286d8db1873368548656b4c2e321320d2b5863aafb716cc9aeb417273a4edfbbff13808afbd25c4ed27df67494a5
-
Filesize
162KB
MD56c08e4afc5f8ad117db31d3ddb774bac
SHA1b85d28f427031198c591cb4c257c9d4ac4fcebac
SHA2562bc43fa2de4fe6a904f0247df6b3287aa752c8210441bc73cf165deef53a00cb
SHA5122513bed3fa7aa33e41b694a4bdd66fd5ddf8a70b3245298c833c71eec1128fafa57da6832abf86fbd8a60395b669820674005b40bca2ebaea13886417deaccee
-
Filesize
131KB
MD52e9b349ef2a6e681fd32c4365f03998f
SHA11fd68a734908f7ffb1b0330ba4effe1a84f05ce0
SHA2567ed5b44ec78b1f68e419fd11bc2d6bc1641f711f2800ea3d7342b3e154819187
SHA512371dff53674563d8cbe3273fe1e8c6e77345ec14877104335de3425dbc159c03d671edd3130dfdc3e3688b9a99af94f7885619593fd416199c64d38e6ba21bd7
-
Filesize
131KB
MD5e07900548db8945e3c4151eb92583032
SHA1866c4185775555e6fea9515aeedba56e752e015c
SHA256443a28b26733368e7c0fd4e495423f6022173797f2c63a8ba4bb2252a789b0ce
SHA51265a026979803c36833cb63671a71a91d3e9e6b7807cadfaf487f09541f8071be838a4a4726fdf0d7387ef97dad45a957ae769ff47e24def863d98952e18401f6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd