Analysis
-
max time kernel
599s -
max time network
570s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2023, 12:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.OrbiMed.com/en/disclaimer
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://www.OrbiMed.com/en/disclaimer
Resource
win10v2004-20231215-en
General
-
Target
http://www.OrbiMed.com/en/disclaimer
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133478096351786696" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 4504 chrome.exe 4504 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe Token: SeShutdownPrivilege 5056 chrome.exe Token: SeCreatePagefilePrivilege 5056 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe 5056 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5056 wrote to memory of 3000 5056 chrome.exe 30 PID 5056 wrote to memory of 3000 5056 chrome.exe 30 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 3004 5056 chrome.exe 91 PID 5056 wrote to memory of 232 5056 chrome.exe 95 PID 5056 wrote to memory of 232 5056 chrome.exe 95 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94 PID 5056 wrote to memory of 560 5056 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.OrbiMed.com/en/disclaimer1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff932b19758,0x7ff932b19768,0x7ff932b197782⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1804,i,14322936510575246725,14469447118362483140,131072 /prefetch:22⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2792 --field-trial-handle=1804,i,14322936510575246725,14469447118362483140,131072 /prefetch:12⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2784 --field-trial-handle=1804,i,14322936510575246725,14469447118362483140,131072 /prefetch:12⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2148 --field-trial-handle=1804,i,14322936510575246725,14469447118362483140,131072 /prefetch:82⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1804,i,14322936510575246725,14469447118362483140,131072 /prefetch:82⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4692 --field-trial-handle=1804,i,14322936510575246725,14469447118362483140,131072 /prefetch:12⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 --field-trial-handle=1804,i,14322936510575246725,14469447118362483140,131072 /prefetch:82⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 --field-trial-handle=1804,i,14322936510575246725,14469447118362483140,131072 /prefetch:82⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1804,i,14322936510575246725,14469447118362483140,131072 /prefetch:82⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1804,i,14322936510575246725,14469447118362483140,131072 /prefetch:82⤵PID:3224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4968 --field-trial-handle=1804,i,14322936510575246725,14469447118362483140,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5ec421c87422332be79b55ac6758ce594
SHA1547fd7bbea4189f76a091a06b6d19b4271f2be0b
SHA2560313b9815b03c2138866dcd75669ce5c3a1ac291e97d647a79c3ee24a15721b7
SHA512e67d5405509ee2ea636c249b8a05dccadd0f82992fde4242024f395e91f56d372c92fbbe4eecb41980dd6a9590e27698777cdd9d853702c5aae99dbfca3db369
-
Filesize
2KB
MD53e90751516e6d69fb1ef6552c804c031
SHA16358256da5718a9feb89ffc88afeed52e9e6c896
SHA25694653de462f050f79d849b803cd471063f924a11564f66e4d7763070f56f5796
SHA512c8f07d1544a3cc0fc1d5fa49e38b321a08b6a0a450509c2dd721030f19eb47a0819ccb8c7ef401e156472b4b5f352eaebd48da09e1f74783cb4e62dc65df9a74
-
Filesize
2KB
MD52a85ec93f1613685a9d084a42eb47f95
SHA178ea364ac8dd20012a4e7724929f39510e89c6f9
SHA2564f69da18bb12602480da2f9202c8a52178b2f1f4bd3df27c6b7836f9f8eeadb7
SHA5127996dbfbcb179874cafa9ff14d7c0f6a3a84928f7bc261f8b7e844de2f939b2ed69c5183c195a811d85936022efb35b34eb482787ba34aad368242b00a6cefd3
-
Filesize
2KB
MD57ec467517a399b99b9d1fea038e6f092
SHA1ddda7ed851b1c817535a6953a7fe7693da753f72
SHA25628a97dee2816576351d98fc9b7f74ff7f6f12778262165d0b59cd5c8848d9c57
SHA51275056e5d812ce490afdd7ed52d9fdd2f4a3a2d2f5390463089f54d5f8fe9abc3223aaf28a4b01b0af42d81821b4788b0e50e7fa69fe599cbbcdd7866bb9f1ebc
-
Filesize
867B
MD5b624261df56ec5f43b2034789e5c1149
SHA1d259f9f09aac65e40650f54d338b6a2f13a5f26a
SHA25678b41b669bfac65a5d2436fb5f1d5a5daeffc2bc3c17a94846d8c0e1d92ba907
SHA5120fe6f46dc815990e85b6448216bb533183048e347a205f6319f5790baa3445ba3bedd07e71f96f920e61810546f566f43daf69b4acf2be0f96d379e9911cba32
-
Filesize
6KB
MD5620e823f18c1c9ac4881866353b02dcb
SHA165d3f114ba8a770e5de62662eb1a322f5e408547
SHA256339972165387350fbbf9b9190bc9d061f67a248f4b19baf9cb0fdbd774cdea1e
SHA512f873429a2644ae9f6c463b42d5880cd7c9bff13f0ff5ed4cbf77f310eb6cf3ea45ed70768f08edb91df9092804d69cf3876d24fbabee65f34dfebcb5f00ef437
-
Filesize
115KB
MD5e267949f999258b2416dfae1bb7c0abb
SHA182e2e01dadee4b5843ce96a4ef25d1decc7b5a7b
SHA2563b04953d72916ea19ecacf24fb8a8eab3c7ba9c35ec8d5cb5df8703a3846a8b4
SHA512d62f0a4c7ed93f279501d9a028228c75d1566aa5fbfc6f6d8c72a78080b42be19e6a0898aa3009392726c681c4cab7ba62c9113c72acba26581489926100522f
-
Filesize
64KB
MD5787d403267b66dc15b0e21757fd23271
SHA1eee3c89ec436c838d265df9c45f3c8776e48d809
SHA2567a055c32be378d405b26e335e27c7e0ff09d488863f33349f25a06101b0a496e
SHA5128c9a561265a348577bafd38455a2f46f7c2449055f8d0bb4d290388293edd92b9c2bb573b2f71d19b3be3c97380e38f7882e9d584fdbb0a3af680a20792fe0d4
-
Filesize
116KB
MD51e43044d64aa3a2ff3b93ee111e6e1ea
SHA192ee8d3450670b140bfb9b487ddccab3dff4640e
SHA256b110d793255e2f522d95ad8083ab4d34dc22e2cf902e9a0326b7a8baafe7a6fe
SHA512164ced941f11534af01e431c3429e7cd7b8cb225dac2fcb82a6057c1e853b6ca55df806acc7f194fa0b50905a6305294079d200e9046fe6b1938d9c1be8d140f
-
Filesize
97KB
MD596c9193e9e33b5492c1216bcd73d7d1c
SHA14f81f36af79746db28ae0b556cf6fbfd37f880eb
SHA25685fb8d012ecc70ae5d09353d5ca2b66bd686a6da30a305eedd87a803768c1dd0
SHA512b83c0fbb79000b9ecd44b8297335d229a8c0c321b06848396ec690c00caff7252b3e1521b1173e6a083257e8784d627ace64def67ad38ae9530b86f40fca6d87
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd