Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2024 09:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://ngqm6.net/secure/1/
Resource
win10v2004-20240802-en
General
-
Target
http://ngqm6.net/secure/1/
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133676683117922129" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2284 chrome.exe 2284 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe 3064 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeCreatePagefilePrivilege 2284 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2284 wrote to memory of 5080 2284 chrome.exe 83 PID 2284 wrote to memory of 5080 2284 chrome.exe 83 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 3120 2284 chrome.exe 85 PID 2284 wrote to memory of 4820 2284 chrome.exe 86 PID 2284 wrote to memory of 4820 2284 chrome.exe 86 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87 PID 2284 wrote to memory of 2676 2284 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://ngqm6.net/secure/1/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd4,0x108,0x7ffd1fcccc40,0x7ffd1fcccc4c,0x7ffd1fcccc582⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1956,i,468225322342404507,14707821685178347517,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:3120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1872,i,468225322342404507,14707821685178347517,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2000 /prefetch:32⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,468225322342404507,14707821685178347517,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2224 /prefetch:82⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3060,i,468225322342404507,14707821685178347517,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3080 /prefetch:12⤵PID:708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3068,i,468225322342404507,14707821685178347517,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3116 /prefetch:12⤵PID:944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4552,i,468225322342404507,14707821685178347517,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3044 /prefetch:12⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4020,i,468225322342404507,14707821685178347517,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3348 /prefetch:82⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4896,i,468225322342404507,14707821685178347517,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4892,i,468225322342404507,14707821685178347517,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3868 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5eb67fe3a70a38d88cabfad239d9bc143
SHA11a3706ef5c3f2b13f7a9a5b178b2dbe9cc6f8901
SHA256a5b0354f566e04cf7ead02b6609598c0b9d1b32d91a86918aba7e1c05f5b27e7
SHA5128c882fe99c45e23376d185127b9d7c6e29be97492944ab85551020c6a21e01d496ac40634a848aec7711081ed74d5e672eab47e66e0ded317c8604a4a2249bd6
-
Filesize
8KB
MD597ecb54955ccdd6fd2a4d127e8b89503
SHA1e482ee28124bf82614d9b981c6858d8dd759f607
SHA256742e909562785d0b9c7fd5a558bec94e00743c092a77c5f0a6940aefca82421a
SHA5124b020b50a0172e5d97d405625b2d9fdac94cff10c97bff9dd08031b9b66f953efd8ac168c6813bda40727f6a0dbbd8488be3b6589d5b727ca9bf48ecc1ac69b0
-
Filesize
9KB
MD57126325f5cdc651afb7b44834bc2c060
SHA179664c2515b726a81b9505f7fcf48bf25ee55b3f
SHA256b0ff0df00d3cc1341571646148869d225fd76150c80490e54c15c70b6828c355
SHA512981d5744adc1cf8c268dbd5e62dcd2f79b24fb953620fe906b6d253ead136b1ef5b02c75e9cbe8c4319956b5acf0c26b9d393ba1dc454ac0bab91eff6e64da70
-
Filesize
8KB
MD50481db4e7f2313b3f67cdd41937daf47
SHA163342ff4ade8ffc83894ed97ce9375a8cdb7c9a5
SHA25652fc54e66bb97c6d677ae9279dd39003d173cc6398d14ba6792d5a3d5d38d1eb
SHA51280e7713ce142890bba3b6b602cfea4445a60d0a818b5579f0e634de0e240c4e221c06a4f813e2e3be60303c40a5682468429de8d29b26462007acadba62cf024
-
Filesize
9KB
MD5ac5049c1c13603c388ab8d1df74d3cb1
SHA1d41567e4ea06014517bcfb0c25686fa55f9fb763
SHA2565bfc64a25d002cd4e61e42f99a7a3726edcc3214a269a0ccf6b75a1f5b7f8ac1
SHA512ebd67033031cbcff541396c9798737d3febda4c5c12828382f5a9493f53104d2c02ec6356693787f86f1f8927da5426f8c415832e05a063f40da1fe78d323627
-
Filesize
9KB
MD554ece4af70b93b0255685b8b8b9d9c23
SHA13c5f308449db620bc9c6a95b7a359ab7f3377dd1
SHA2563083eab93fb5fced1131901642340c6769ac51cc37a575573cd06cc043a6b9ee
SHA512a3e67e6129c9e8a246cae08eb5a793344d633232afde5e8993013207ebe04c92d3dacb2b6b0c532665337bec0de4ec0112d01608003a0791bb7c6956f1ff05b5
-
Filesize
9KB
MD5e7b994be95917494363b7ff6c0f45f02
SHA1223e8324464946a2f8de1e2ec24e16d9fd9999ca
SHA256f4d6a4e68ec3668c3315d3abb500d1c37239e75ba6130de74d6d86a8b9a76bba
SHA512aa319d1eb10af759484431bd2588cc083435d8174418f8fd00b6e3577fc6b3436570537a2a8a174ab681e6497fa1342f7599bd02158fb910f11d9ae78668507e
-
Filesize
9KB
MD5cb092a86b03278810092c4240ca85426
SHA1732463275244e7dc2160e2a9c585d6be3c71205c
SHA25635fcd7e086b949a53e8e05b92f685e09810128f7ca63f8a6f7f6e6c81abe7eee
SHA512fc93c8f2df2f396c7b07377ff73c39e186e2bc908159d0b92fd28043dc486314364502379cf20f06f1a30a92ac3eca0086b79a957b1e66e46540a50b64c5a04e
-
Filesize
99KB
MD5464a737a8446cebabbd082632a9de80d
SHA1368d34f331216cb90a12eb544c33eb62ad2b874f
SHA256f035cbd76186abc5a83d3f1f87e0d8dad93e8d4e2e6fccdc7a81506ba3162bb7
SHA512bf4f51ae52b9994da443a71e14b5e016aca50ae177634a76ad54008f1a45728098a1e0751153b7d198d22b8c3948d8a71b0f56b5c789623ff966d1228001bcef
-
Filesize
99KB
MD5387bd6d6e4ec9480382a036f5c85c12e
SHA1fb824028dbc34188dd24c6cd344da31af5e7cbfd
SHA2562e649da0b95ff3bda25da6683b71c8e2c20870b8a1fbe1ac7fa3f447c3a09709
SHA512cc5810cac679e7ac9b33bbc153262efc47b9bf7b4061ae28dde99e28962ed05d10e26573e16934b2c8807ef2bca360f918975d7ebef783f87efed94882960c5f