Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 05:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://snip.ly/22m1rz
Resource
win10v2004-20240226-en
General
-
Target
https://snip.ly/22m1rz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133591021236413971" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1944 chrome.exe 1944 chrome.exe 5016 chrome.exe 5016 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe Token: SeShutdownPrivilege 1944 chrome.exe Token: SeCreatePagefilePrivilege 1944 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2384 1944 chrome.exe 92 PID 1944 wrote to memory of 2384 1944 chrome.exe 92 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 3748 1944 chrome.exe 94 PID 1944 wrote to memory of 4056 1944 chrome.exe 95 PID 1944 wrote to memory of 4056 1944 chrome.exe 95 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96 PID 1944 wrote to memory of 432 1944 chrome.exe 96
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://snip.ly/22m1rz1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbfab79758,0x7ffbfab79768,0x7ffbfab797782⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1900,i,14649178607559001,10777067863366733531,131072 /prefetch:22⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1900,i,14649178607559001,10777067863366733531,131072 /prefetch:82⤵PID:4056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 --field-trial-handle=1900,i,14649178607559001,10777067863366733531,131072 /prefetch:82⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3240 --field-trial-handle=1900,i,14649178607559001,10777067863366733531,131072 /prefetch:12⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3252 --field-trial-handle=1900,i,14649178607559001,10777067863366733531,131072 /prefetch:12⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4580 --field-trial-handle=1900,i,14649178607559001,10777067863366733531,131072 /prefetch:12⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4840 --field-trial-handle=1900,i,14649178607559001,10777067863366733531,131072 /prefetch:12⤵PID:904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5072 --field-trial-handle=1900,i,14649178607559001,10777067863366733531,131072 /prefetch:12⤵PID:1592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 --field-trial-handle=1900,i,14649178607559001,10777067863366733531,131072 /prefetch:82⤵PID:452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4580 --field-trial-handle=1900,i,14649178607559001,10777067863366733531,131072 /prefetch:82⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=6128 --field-trial-handle=1900,i,14649178607559001,10777067863366733531,131072 /prefetch:12⤵PID:904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5352 --field-trial-handle=1900,i,14649178607559001,10777067863366733531,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2220
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4168 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:4600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5fc8d21cb15d0a11dccef7270beb97a96
SHA1f0c1990cfd6bbf90b8488b329a0a8eed7852cd07
SHA25631aa33846a2654fd0cdb87082a32877f2bbac1d85d7bc45e7e5f12316ef10c2f
SHA5127ef229e422e2418a16bf382f829b1ad00dfa9a7b1ecd9af7eabbda644a1f379f6b1e2299abd63471eeb125322672c6509fc057f718893bbd80070ab777302769
-
Filesize
120B
MD504c546d7aff158ea2535bcd178fd998a
SHA1558b84307974721f555748b244f978250d840cef
SHA256893146faac5e323e0877605abb498b8e119363e6161c1f771afb844cdd97fcaa
SHA51264d50f0ffbcdd67492c4031a3c1b9883739646fd3f4b391ba753c0b03909c76887034f0c85a448934b350b5eb091943ec64a193a388ef0336d6db09c883880aa
-
Filesize
1KB
MD58b3ea8b2aa37538b52ed4f311a9b3f42
SHA1623861a29c2efafab824ccba3b8b46423271dcef
SHA256c41125206e5a5596a4120856978eb159e7fdbfffeccc8f31bf05eef0630cc395
SHA5127b244355a5755d27df8f49aaae018a1a43eab338fc431df2da7cd5812222baf833c2ecef5a7e2d51cc81c8cb5d4f33d7ab80579d7d1a7bea20e88f6ecd277a78
-
Filesize
6KB
MD5418b0a92a58b1d8323d9a1aa4214d26c
SHA133389105ee0cb3f6fcc9fced144394ab481d408b
SHA2567a3e0af3d9d86baa2378f37f1c6d897cb5b5fa2601fa4aaf4722685951069484
SHA512fd362f9ead74caaaa105b3463ee2d3bca92ce95cc7778f8b1fd706a0b89d53c71e00ae65414afa8edebf6a298b84d937bc80a484310070d879cfcf2a5803e798
-
Filesize
6KB
MD5c3282bd98d2cace5c42d9b9324f010c9
SHA15ae729758040c83c4610a898f09daaa40fd349cc
SHA256ba5f57b33b73ea5d080e5fdf60d5f22cdfbc208cd6bef1e95d8a2d1778673406
SHA51253707f3d14be844c2b53d6e67718f97ea4b3a82ef8a61706c588ca8274fbd02a2ca07df895fb3d6c9cf8909e52e21c9efe4ead0732a46a2e19563c8d1d5308af
-
Filesize
6KB
MD530dcc6b0067f4ec70a4ad6669be447a6
SHA18dbf5ab0c16297dd621326643d1c244ef342b84f
SHA256aefdf397b59938a485e37aff78381b2dfed1679b026c338846bf35e9986f8c2e
SHA512d3e6f24f009f8349b4698ef40be3ac29e22747599af24add6bad2d818565bd397f5880d8369bf6ec5ff17baead070c50fede35e00a9a7d8bcb1ae50da3f8da7e
-
Filesize
6KB
MD56fa1d736d29409c6e9cf7e03034c4abd
SHA159dff7527c545e35b5d4b8bd1d065f9124ca3787
SHA256b4b7c01d5e58e941ff297705fc1e1b74f8ebacabf1c460797ebad7fd322ee558
SHA512f353ca64396998226eccb5483df25f1e9ea97a2ceadd8e92f1c57cbe9ef59035bd8de1135d0655a109abdb208befc8daa6e56501b970942b76821a1398247f51
-
Filesize
128KB
MD55998cc3dd18e52e34d2bd65a8eaf4032
SHA10a7909be323616d48922ee000316b80bc6ef208a
SHA256985dcbf8ddbbc646787c53f13684e0941711ee49cb814c310f4528a8b184f094
SHA512599c395874e1b1eeb3efd905ec66cf91cd8e6b0e9c7eb15d27267e78c84e41581ab01e24fac810e36e5047ca21ebb2acd9c64d3a78536900bf8abd2f1e6931bd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd