Analysis
-
max time kernel
1557s -
max time network
1559s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 17:50
Behavioral task
behavioral1
Sample
hi.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
hi.exe
Resource
win10v2004-20240412-en
General
-
Target
hi.exe
-
Size
8.9MB
-
MD5
452eb6017af3dae785d12d2bc54b2596
-
SHA1
82db514bac7763271d7a62cf74010073088d4ea9
-
SHA256
485e31d1f74c8b8087ab8a7011809ded8fea72ddc1998f3d1540c43b77a92ad2
-
SHA512
f6b7b9832ec1d9d93364253cddf2b1c6213cc13e11770c198fdf0b48000fcaf34656e3a65e8ab72436bb51672567c9595830a13a546926c416d828c846d3e932
-
SSDEEP
196608:dqlol91/dQmR4uErSEEJw/aA0W8/LV2ckfFjVZruZSxB:SadQf+9JoaHW8p2PpuExB
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2712 hi.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1528 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 672 chrome.exe 672 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1528 vlc.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: 33 1528 vlc.exe Token: SeIncBasePriorityPrivilege 1528 vlc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe -
Suspicious use of SendNotifyMessage 41 IoCs
pid Process 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe 1528 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1528 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2712 2832 hi.exe 28 PID 2832 wrote to memory of 2712 2832 hi.exe 28 PID 2832 wrote to memory of 2712 2832 hi.exe 28 PID 672 wrote to memory of 536 672 chrome.exe 30 PID 672 wrote to memory of 536 672 chrome.exe 30 PID 672 wrote to memory of 536 672 chrome.exe 30 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 1184 672 chrome.exe 32 PID 672 wrote to memory of 2784 672 chrome.exe 33 PID 672 wrote to memory of 2784 672 chrome.exe 33 PID 672 wrote to memory of 2784 672 chrome.exe 33 PID 672 wrote to memory of 1464 672 chrome.exe 34 PID 672 wrote to memory of 1464 672 chrome.exe 34 PID 672 wrote to memory of 1464 672 chrome.exe 34 PID 672 wrote to memory of 1464 672 chrome.exe 34 PID 672 wrote to memory of 1464 672 chrome.exe 34 PID 672 wrote to memory of 1464 672 chrome.exe 34 PID 672 wrote to memory of 1464 672 chrome.exe 34 PID 672 wrote to memory of 1464 672 chrome.exe 34 PID 672 wrote to memory of 1464 672 chrome.exe 34 PID 672 wrote to memory of 1464 672 chrome.exe 34 PID 672 wrote to memory of 1464 672 chrome.exe 34 PID 672 wrote to memory of 1464 672 chrome.exe 34 PID 672 wrote to memory of 1464 672 chrome.exe 34 PID 672 wrote to memory of 1464 672 chrome.exe 34 PID 672 wrote to memory of 1464 672 chrome.exe 34 PID 672 wrote to memory of 1464 672 chrome.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\hi.exe"C:\Users\Admin\AppData\Local\Temp\hi.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\hi.exe"C:\Users\Admin\AppData\Local\Temp\hi.exe"2⤵
- Loads dropped DLL
PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7b19758,0x7fef7b19768,0x7fef7b197782⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1108,i,6785155378693985551,14673965088167348322,131072 /prefetch:22⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1108,i,6785155378693985551,14673965088167348322,131072 /prefetch:82⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1108,i,6785155378693985551,14673965088167348322,131072 /prefetch:82⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2160 --field-trial-handle=1108,i,6785155378693985551,14673965088167348322,131072 /prefetch:12⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2164 --field-trial-handle=1108,i,6785155378693985551,14673965088167348322,131072 /prefetch:12⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1288 --field-trial-handle=1108,i,6785155378693985551,14673965088167348322,131072 /prefetch:22⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3224 --field-trial-handle=1108,i,6785155378693985551,14673965088167348322,131072 /prefetch:12⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1304 --field-trial-handle=1108,i,6785155378693985551,14673965088167348322,131072 /prefetch:82⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3556 --field-trial-handle=1108,i,6785155378693985551,14673965088167348322,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3500 --field-trial-handle=1108,i,6785155378693985551,14673965088167348322,131072 /prefetch:82⤵PID:2732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3580 --field-trial-handle=1108,i,6785155378693985551,14673965088167348322,131072 /prefetch:12⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2904
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2624
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\ClearEnter.js"1⤵PID:2044
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Public\Videos\Sample Videos\Wildlife.wmv"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD52c7df83bd27fa1f1f5304e4c120b7b2b
SHA17dd7b98955b0eab777fdca9e2fb87e5b8fda80aa
SHA2564f54fcda28ec46e2b27185bd7d9922f46043fefbbf66d652ce67ce0ba7696379
SHA512d2b530acaccd849e997b326efff3a89d14e8ee8dee43911e42d32bf17cbc16c42d844f72c3c4972307c28893aec71235e2c9f41575564b72cd83cbe44015165b
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
363B
MD5b6f8b8a53897b8aa7bd5c77dae8ccebb
SHA13ace2f340cd8c0ae14635ccb89527278200712cf
SHA2560fc79f7b7961a96a96a92d161939fae7e0fe3f2f2751a1f6ead98874c93dd1ca
SHA512abec217a35396717708049cc498cddbdbcafd65187bbb3faf9e0fe9bfd29a17cbd39312e12cfbd7a2adc164790ab0eb2035ed79d2f5283b3b44cc6cf3d45cc12
-
Filesize
6KB
MD539642fc723ce8dee90f2e815c021553f
SHA152ac06b16d57e797e9f1e4ac58078e4c7257df37
SHA2568ddee67dc5eb5874a0e0460062bc67d8ef0893960d55eb81c8d65e326fd10f24
SHA512fbcc7e5aeddfd8a27c2770220bffdff667f49a50b1af93dcfb2a42fa2acf22718546c6d6778c791d6ee72ee1a57da1bea4980ca9689e90920ce9edd1c5201d04
-
Filesize
5KB
MD53a5f94ba99a20b0834aacece7a16dfb8
SHA1af0d8e83130c895e7c082a97bce68bf33769186d
SHA25658adf0d2f991e2c1e83b69e80ff7f413f92e8d2d57d93f2fee73b4df77587f1e
SHA51258768763ebb5a16a45edde0b89020af2271b99a04c8134b2d1e6e08780ebb821457df555c18e23b74505370dc13408e33edc4fce9662651e2f5ba1f1d14412f2
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
263KB
MD572d7bbee1bc95182d3ab1bbf5a341ea6
SHA187c305ddabbac9439b589fbad9e50ca7d4acd899
SHA256eabb3c53c0b397d422cbab044fc8c2f83ccae21b61950be41bfef07dbfc03c04
SHA5123228ad67034392d407fd39c25c490af332061d4c48943394f0b1536cf5de9dfba46eb56888069199eec45f62936ea8f811dd23ef3e676e49f2d600500b53fd2f
-
Filesize
5.5MB
MD5a72993488cecd88b3e19487d646f88f6
SHA15d359f4121e0be04a483f9ad1d8203ffc958f9a0
SHA256aa1e959dcff75a343b448a797d8a5a041eb03b27565a30f70fd081df7a285038
SHA512c895176784b9ac89c9b996c02ec0d0a3f7cd6ebf653a277c20dec104da6a11db084c53dd47c7b6653a448d877ad8e5e79c27db4ea6365ebb8ca2a78aa9c61b38