Analysis
-
max time kernel
39s -
max time network
40s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
03-05-2024 06:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pub-9ad96370a6144dd1b9a7985cb29c6629.r2.dev/eurxs.html
Resource
win10-20240404-en
General
-
Target
https://pub-9ad96370a6144dd1b9a7985cb29c6629.r2.dev/eurxs.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133591908000517429" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3012 chrome.exe 3012 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
chrome.exepid process 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe Token: SeShutdownPrivilege 3012 chrome.exe Token: SeCreatePagefilePrivilege 3012 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
chrome.exepid process 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3012 wrote to memory of 2184 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 2184 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4576 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 3540 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 3540 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe PID 3012 wrote to memory of 4684 3012 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pub-9ad96370a6144dd1b9a7985cb29c6629.r2.dev/eurxs.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff834c39758,0x7ff834c39768,0x7ff834c397782⤵PID:2184
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1540 --field-trial-handle=1856,i,420141338265904556,5022070299603069034,131072 /prefetch:22⤵PID:4576
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 --field-trial-handle=1856,i,420141338265904556,5022070299603069034,131072 /prefetch:82⤵PID:3540
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1856,i,420141338265904556,5022070299603069034,131072 /prefetch:82⤵PID:4684
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=1856,i,420141338265904556,5022070299603069034,131072 /prefetch:12⤵PID:2744
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2888 --field-trial-handle=1856,i,420141338265904556,5022070299603069034,131072 /prefetch:12⤵PID:4424
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 --field-trial-handle=1856,i,420141338265904556,5022070299603069034,131072 /prefetch:82⤵PID:4176
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4444 --field-trial-handle=1856,i,420141338265904556,5022070299603069034,131072 /prefetch:82⤵PID:2296
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4412 --field-trial-handle=1856,i,420141338265904556,5022070299603069034,131072 /prefetch:82⤵PID:1828
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1856,i,420141338265904556,5022070299603069034,131072 /prefetch:82⤵PID:1544
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5044 --field-trial-handle=1856,i,420141338265904556,5022070299603069034,131072 /prefetch:12⤵PID:4108
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=852 --field-trial-handle=1856,i,420141338265904556,5022070299603069034,131072 /prefetch:12⤵PID:1152
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3456 --field-trial-handle=1856,i,420141338265904556,5022070299603069034,131072 /prefetch:12⤵PID:3900
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD51cfb3f5a7ed997abd0df404c2bd5ad7f
SHA14995b5bb4b3c5e2f426e7f233f6fe6bd3473cc56
SHA2567c30deb404aede25107c3277e63d8790d16a6907e5c351e6cad6c223728951d8
SHA512b9b6e709afa3f15d6eec5b194503980cc9932dbeb9e5361dd66a0f441671c60c37dfb92684246a20b5ffc1d22048cf82a9e54e020d96018bd40041e83ef18d45
-
Filesize
1KB
MD581f3cfd8b65f8027062b6e8dbc052b16
SHA1e1c27cc01413481666fb4ff718271f14c55b2553
SHA2565404306c2a3dae2cdcd7d65d48f4b515e2341305c6418f4b45013813920f5e9c
SHA512b02f518a559786c7e5a95d35e268f5102844ec5cb4eeb4e595e06b76245ed3bc976a79656c22574de53150e0d79b53139e1a577f2705967de957f0fd3e184777
-
Filesize
6KB
MD521bfeecfbee48520f78b941b4a37c5fb
SHA1af308e9470f2290128e89b22b8939b22ff3d2262
SHA256554c6a9163e6e0fd4707aa73517ef6896992cb0fd24bb265f6d2e7c825855a29
SHA512f71c67182dfa6c0c394d01bc96533211faeca3e3c0bd0f3ccf40ce2c926e46a2610fa8d14980808e65f2a585cef7b41ecde3d4193c084d4235fc2378308845f9
-
Filesize
7KB
MD587842290d3c2ee5f54ba5ceafafb7af9
SHA1d422567e5f63f2d418dba420bbfec592511a65f1
SHA256be0554f788c0342fdf45a683af3d5c306eac7e978836ee5cc369f9d9a33533fb
SHA512bb1ac0d84b966194484ac6e17377ee8f120d8b5e3cac4aa973cbbe9f163854dec2836138e0be6d999bbcb93045c6ce7e76af00f4cfbd153a3ffc0204f1eb8d40
-
Filesize
138KB
MD5696e2fb4024df028eff11f258d852a05
SHA127a815c2ecff7b3815adf091063edf29ecefbd3e
SHA2563e2293a9c23c233266e9aa478c0f48555e5c7d1fbb93920d7080801060af57d3
SHA51289d546551406418572c38e787b70dfcd4b5ae581af3fa3d151537216d6813cf0786bc667644d8720d8bdd500812d255cab13db1d43690b3662ff41b00787cc5a
-
Filesize
138KB
MD5df69564e63940ddb76bfe8051f218032
SHA11ee738ca65f7b4a9f19af237fa308b447c2808b0
SHA256dafc0d07735aad1afd676edb6300b8550481b93a686edb313f0f8bc6ce4ec36d
SHA5120b3041637023cec4bd88d959d3a0e64b86636b0fdced38d6f54443b8a740ce497d1420a52c155135b685a98d40e0bfbfc0ab157350a8d4a001c1d067b273b9e6
-
Filesize
137KB
MD5605a36cf2702266cb4874b1e9a9fa561
SHA1e553981824641ab421ff3358d5610b5181ab4c57
SHA2569b69823dc33b4d96e43ed163cc3b6291193b419ab64c3b80d1131c861ad926fb
SHA5129e4b7a45e2a64d00c2a598f57603f8c2540f7523c8a0dada16619b62cf0fdef6b101463625185e60f232e45d0a1181460673d2cc5e757984aee209c4f5cec1c6
-
Filesize
264KB
MD5d06f85f62d5774691febb9d2f4b9a334
SHA1936a1c92872dda29232f835aeaadf1d42732c8ab
SHA25657222a18a6395c521be3191528ff30543e5fb8c2d985cc86ecee39664b667d34
SHA51254097a7f674817c07f68c4ce1d119a580715849beedcc1682b6cee3287bbb6e18e7fd81bf24a58bcbdafa00acfec2e1b5b05e2a0b92c8164555e554d9da8088a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e