Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 07:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.totalhealthcover.ie/
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://www.totalhealthcover.ie/
Resource
win10v2004-20231215-en
General
-
Target
http://www.totalhealthcover.ie/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133488282229469363" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2308 chrome.exe 2308 chrome.exe 1116 chrome.exe 1116 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe Token: SeShutdownPrivilege 2308 chrome.exe Token: SeCreatePagefilePrivilege 2308 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe 2308 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2308 wrote to memory of 5072 2308 chrome.exe 88 PID 2308 wrote to memory of 5072 2308 chrome.exe 88 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 1628 2308 chrome.exe 92 PID 2308 wrote to memory of 2924 2308 chrome.exe 93 PID 2308 wrote to memory of 2924 2308 chrome.exe 93 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94 PID 2308 wrote to memory of 1444 2308 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.totalhealthcover.ie/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf7749758,0x7ffbf7749768,0x7ffbf77497782⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1872,i,85140488617683832,5172332206110210583,131072 /prefetch:22⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1872,i,85140488617683832,5172332206110210583,131072 /prefetch:82⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1872,i,85140488617683832,5172332206110210583,131072 /prefetch:82⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3148 --field-trial-handle=1872,i,85140488617683832,5172332206110210583,131072 /prefetch:12⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1872,i,85140488617683832,5172332206110210583,131072 /prefetch:12⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4560 --field-trial-handle=1872,i,85140488617683832,5172332206110210583,131072 /prefetch:12⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3324 --field-trial-handle=1872,i,85140488617683832,5172332206110210583,131072 /prefetch:12⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 --field-trial-handle=1872,i,85140488617683832,5172332206110210583,131072 /prefetch:82⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 --field-trial-handle=1872,i,85140488617683832,5172332206110210583,131072 /prefetch:82⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3504 --field-trial-handle=1872,i,85140488617683832,5172332206110210583,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
504B
MD5e464373aff05675a57eb33d47c146ce2
SHA1ad9a9fdb29180b5be339bce005270dd7e697daa8
SHA256b3ee70c98cff29660766d7acf4b50ceea1f4c48141f65cd814756be85b217f4d
SHA51271519efd01755d578f51c483920e02a07e1f95224c1a517f2937a84922ccf0ca52ea0b061e79b2fc5c17775e7161cf31408d50b89d008b34164bde2291a0fb6b
-
Filesize
4KB
MD551efb2f596ba8b2de2cf3273195a1931
SHA13622e619430398663efedc756daf52172b97dfb3
SHA256ff8c7620902fd3dcf849284e52c16e9043432219a71227824c12d94df23b0a20
SHA5128ab2a082501c6bd2cfd09452f4b832a4f75ce5df4d441e138ada8f465c4ed863022203f796891951f3065120cc50e96d4a249ffeabd7bca71da24ddc971e118d
-
Filesize
4KB
MD536661bcf6d65b05067503ff7721a71ac
SHA1e69d47c2efc75ffcbabe06700a7c8733c197c088
SHA256b5a5caf6f617c4a68e78db1d8cd1ba9f7e92085ef5f3e4c11db85bf7d1fd8cd1
SHA512fee00f16b70a7cd902a291c5dcb70fcf2756459dd5b91df785e9c3c4687f6322007babec2e62983220e6617c5a0aaf7177f80bba509ea89e5bf76c772f4567eb
-
Filesize
1KB
MD5fe93995eff7cd286d1fc29e989cfe590
SHA15acc989d7788d3e044f8fadf0e81ad56a26a01be
SHA256de99067598790d7f9eedef80f838bc37c72b947d981cca9d11203be8ac86a1e4
SHA512ae79e732fd07e131584212d34b4a21cb6e598b4829bfa8b6f7fe43c8cee68c140d27e1989f78b13254a3944351345a69aa979d6be8532f8511e1706cba4d14ea
-
Filesize
5KB
MD5de4d7851ddc101229a515baae4df7522
SHA1f80db54ff1ba90ce1ca77d686155d3991da4939b
SHA2569eacacbbd4e255ed1e57282f5aa50af4660728985ecc6964c09be0fb50e35860
SHA5128fb5cc17e2c2a3da1b8fb702cfdd8af126e919df1ec24ab45e71ee0436e5bd646c7fc7182cd3266e31b38dde3b2413b0c3f6293bffe2cc97045ee6e25f4944f3
-
Filesize
6KB
MD538ef8aa03a7bc95cff81e6c54cacd732
SHA1f5c7d80daed3a88e03b48ee3d5c779c00b06de6b
SHA25643ce3344d8f6ec8ac370e17114e595b561aff6cc6377dc3fe5cbbecc3e84322f
SHA512720650eed5ef5b0bcef156ad01ef37bcb172b394e0d79a78229c522846e5af828aad038d3d355db5c325c04f4b401da20e2aa7c71c333e5c1225f40652e095ff
-
Filesize
5KB
MD5d9ac46f3f807042a5328c12e90848b40
SHA1f6077b1d59c48909628b41bf3d1a534cff00c84c
SHA25600fbf7e050248d0bdc798aaf2761a22ca5e1a0e0d936211a5b03451f7726f266
SHA512ebe950e1c1020c4d51a5e46c1d8cb801723d57b5fed06e25496dae85e6fd5ac06c14b387757793a07d68d33d57624737ed599298512acdb5aaab4ec17124f710
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe57ef61.TMP
Filesize120B
MD5503681c033c5d03d5a74c0e50d6f6a20
SHA1f5e88ea5f899f09a3ddfef21778db14d8d345796
SHA256383d2b3479ef24ad24dbb9c605a1a01e414b46448fe1131613d36932c78e0781
SHA512fc2d893ad5c39d5920f3712a81a6df5acfc41a4c4c7412f6ea9753b99cdec5cdeddf210864e63c25d50aba0746ddd2853e9e1c28d178307927ecc4a4f6a5f29f
-
Filesize
114KB
MD532820f0cfe0f1a741f8ed3b17492d255
SHA18653e19d4801c08fb1ec98aad58264f3c7af82cd
SHA256933307e8174082970b141a0e09114249d5cdf597a67e0500148239df8766b724
SHA5123f84c064693b54b477624d7d0056cbfb77a7b653607273be596626cd7eb2c2e1bb61f2bbdcaa66dd33fde6f654b6afdc62ddcb9c919e870889fbd9dda70e48ca