Resubmissions
05-09-2024 14:49
240905-r7gjasshll 405-09-2024 14:47
240905-r6apcsshkj 405-09-2024 14:43
240905-r3zjbasgpq 4Analysis
-
max time kernel
76s -
max time network
65s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-09-2024 14:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tinyurl.com/m3dp3zh4
Resource
win11-20240802-en
General
-
Target
https://tinyurl.com/m3dp3zh4
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133700210438993354" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4936 chrome.exe 4936 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: 33 2948 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2948 AUDIODG.EXE Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe Token: SeShutdownPrivilege 4936 chrome.exe Token: SeCreatePagefilePrivilege 4936 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe 4936 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4936 wrote to memory of 3460 4936 chrome.exe 78 PID 4936 wrote to memory of 3460 4936 chrome.exe 78 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 2476 4936 chrome.exe 79 PID 4936 wrote to memory of 3032 4936 chrome.exe 80 PID 4936 wrote to memory of 3032 4936 chrome.exe 80 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81 PID 4936 wrote to memory of 3504 4936 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://tinyurl.com/m3dp3zh41⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3699cc40,0x7ffc3699cc4c,0x7ffc3699cc582⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1824,i,16283329250435867752,13660086770497897298,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1820 /prefetch:22⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1828,i,16283329250435867752,13660086770497897298,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2140 /prefetch:32⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2192,i,16283329250435867752,13660086770497897298,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2504 /prefetch:82⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,16283329250435867752,13660086770497897298,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,16283329250435867752,13660086770497897298,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4324,i,16283329250435867752,13660086770497897298,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4296 /prefetch:12⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4536,i,16283329250435867752,13660086770497897298,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4384,i,16283329250435867752,13660086770497897298,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4704 /prefetch:82⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3248,i,16283329250435867752,13660086770497897298,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4924 /prefetch:82⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2208
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D8 0x00000000000004EC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\2100d187-c681-4194-962b-4499f3e58a8c.tmp
Filesize10KB
MD5b1c88088e70a755bd13c92e211766544
SHA12929a9308ab9952e5d8eef5a5cb3a28034489791
SHA256d52671ccbcff2101381203c66b603df5907ee89edf81dd0ec0566fb9a2b1c127
SHA512d316b7ecdcf7de90aa24dc7bf1b1f1833f1e5acbd1fb392d78f2bde2053774d689f579b4e8c7adfcf58572966b7bcff2f73c13971cbbc8de7ff59fb1447e5db2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\8488a6da-58a9-425e-a43a-3c97f581656b.tmp
Filesize10KB
MD5756839cf12fd52d7364f618140b86158
SHA15e4821915cf23a4efc86c20f70c7d9d217e790e4
SHA256614e5367c29bda95015bf58bb74efcac2c23b3964217792d9deeb9402ad65281
SHA5124e1cbd94dc79260dbe110497cb7570f7b7480d60e9a8fb183e1724581e70043bb3ec5cfd10c893c3ca785ecba84fac5e42222b70a033036e8cf899b43a37dc74
-
Filesize
649B
MD570358994900b92958213ed1792ac0238
SHA1ebcbd2b92e4515f8b7a28499612c023773b6ec85
SHA256289e40bed496809d3e147f38c6a8956805471328567d1ef3ea34014bb460426f
SHA51284c562f9f8ebfc49e1762038ad7e777aeaef5f3732d840fc72986313966c0d071fa7830cded88bcf50db0cbdf3731d617e82e352c53a011d723fa78d4965498a
-
Filesize
672B
MD5a1480a6413e5025ddd586a38951daca0
SHA106397ff526eb26bde9d3bedb71eae5c7c93257a3
SHA25698e6cf2bc98d6d24ca47108b0973b0a0ce6f6ff5b1c31e2c94d0c7a0e45edf24
SHA512d992fab536fbfb60017604fd0db99148e0b5bc3a5e5522296aba1b0bb4c23b3f441468fd2cdfabfea2e30be8ebfb3b31d93a3e2ace3111c334842768b6b52200
-
Filesize
6KB
MD505d2cd1579f0efbb08e2fb48448553f6
SHA1a05842e80358c962680206c73bff6958f5b13439
SHA256929f1ff0e35059574c3063f9c4c310f8fdbc2d61bbb990e72f469ebce20b296c
SHA51285a2fa33f294711cc3025469689772c65473ddf15065ee82620f924d1efcdcb246268e12c5b5828c609ff63f021c8e1948fd62a9da516f18cda5edb1ffae6efc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD55fd3e6472adf5f322c26e783df684c3c
SHA1345eca7f93bff399cd7863f8672328c974cdf1b3
SHA25604faf9f05cca0234f8f2b26944fea22b8cce57ecb9dfa561c3932d0a29e81d0f
SHA512ad7f0cec48ec5d9cc9cf2799504525b9782881c0fc5f748da3ccb2adc128a0eaeffea4df68777d246ffe488547d637899c505e7557556a0dc3e0188962bbb56e
-
Filesize
9KB
MD59aca1ce3cca627c8647b3aa58eb87652
SHA188e12310cc0e9d6eaca71aa2d4fbd9f30068ce50
SHA256584376d8be1fe81cbf9727bcd0051259cc3cb711105c0947b5a3f8ee70d301c7
SHA5122f6e7190a64ddd187daad3005870dd89a3b3a6252e64efb19f3efeab4d6fe5b341c9414e37159fc69cba906816f5e6b1877fda5329a20bdfe192af5d32daee3a
-
Filesize
10KB
MD54dc4506e048f70d51eaf1dcc907bfc94
SHA1b305eb9184e409c684c7d529b64109d4dfc9eddc
SHA256f773053c4a6aa43ba07a45b502b5bd3530b780b694b4cc7c0e19d153a4d4db82
SHA512666be4d46bcb0231c118821f5bebd97ce2de0d520ebeb5dffb967a14df711206e8c933e479a9e2ff0ba70424082290e2742fe3ff1b490afd4fc073aefb99b968
-
Filesize
9KB
MD5e963cad0416bac82924401d011ce689e
SHA11b80af2a31ef1ace39f1c5c169c3dd4e5185d3e1
SHA256a86d88e126193d169abffb9221fac13b88c24cf2586e276d0a0005e878612643
SHA512a4813346b587594210c4ea29d33688bbfb96e8cc0565674488bde3568fee47894faa7be694063d4743bdc22159d388954936dad58039f0c225ff6d176b0c5692
-
Filesize
195KB
MD51610072b1e15b6e92adcc8b17cf22b9b
SHA103a3545ee464da61d9c63952619a250eaf6aeca7
SHA256b5988e053cc88300bd4531f788f42f604e3d57c5c26fbda401053a99f8388fca
SHA512e7d3a96be2606ad365ab22f2261ffcd56f05ae4842285e3c3ec9f929525236abac082dac7425328bb6d085c3b6d52583277c7ab0f1716841392b57080fbd1075
-
Filesize
195KB
MD5129d9795016c2736cd8b7d40864fabe6
SHA1fa50cf768e68eda052c1d34fca0cdfaaddf8aef7
SHA256e5a04b6fa0a87418caec6e20b32f99660fc91498c2a9c993119daec3a3eddbe9
SHA512c79915e206e2cc1d2d5b63ff4c3c9f459cd8a67c376311c4449ce6718a2cc9c12eaeafe11a80a5131f51aaac87bbe99c5e3a48d7f8519f7a5a63b89bf79f01df