Resubmissions
13/03/2024, 08:35
240313-khe6lsgh61 113/03/2024, 08:24
240313-kawtdsgf91 113/03/2024, 08:15
240313-j5rx9age8v 113/03/2024, 05:15
240313-fxmf1sdf21 113/03/2024, 05:02
240313-fpjp6add8z 113/03/2024, 04:59
240313-fmq2fsdd4t 113/03/2024, 04:54
240313-fjmvmafa53 113/03/2024, 04:35
240313-e7yflacg7y 1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 08:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.adsensecustomsearchads.com/afs/ads?psid=4682008802&client=pub-9543332082073187&r=m&hl=en&rpbu=https://www.wikihow.com/wikihowto&rpqp=search&type=3&rs_tt=c&oe=utf-8&ie=utf-8&fexp=21404,17301383,17301421,17301431,17301432,17301436,71847095&client_gdprapplies=0&format=r6&nocache=6211710031067573&num=0&output=afd_ads&domain_name=www.wikihow.com&v=3&bsl=8&pac=0&u_his=2&u_tz=-300&dt=1710031067573&u_w=1920&u_h=1080&biw=1857&bih=966&psw=1857&psh=966&frm=0&uio=wi300-&cont=afscontainer1&drt=0&jsid=csa&jsv=610814804&rurl=https://www.wikihow.com/convert-jpg-to-pdf&referer=https://www.bing.com/
Resource
win10v2004-20240226-en
General
-
Target
https://www.adsensecustomsearchads.com/afs/ads?psid=4682008802&client=pub-9543332082073187&r=m&hl=en&rpbu=https://www.wikihow.com/wikihowto&rpqp=search&type=3&rs_tt=c&oe=utf-8&ie=utf-8&fexp=21404,17301383,17301421,17301431,17301432,17301436,71847095&client_gdprapplies=0&format=r6&nocache=6211710031067573&num=0&output=afd_ads&domain_name=www.wikihow.com&v=3&bsl=8&pac=0&u_his=2&u_tz=-300&dt=1710031067573&u_w=1920&u_h=1080&biw=1857&bih=966&psw=1857&psh=966&frm=0&uio=wi300-&cont=afscontainer1&drt=0&jsid=csa&jsv=610814804&rurl=https://www.wikihow.com/convert-jpg-to-pdf&referer=https://www.bing.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133547913432565633" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2492 chrome.exe 2492 chrome.exe 5636 chrome.exe 5636 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe Token: SeShutdownPrivilege 2492 chrome.exe Token: SeCreatePagefilePrivilege 2492 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe 2492 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1316 2492 chrome.exe 89 PID 2492 wrote to memory of 1316 2492 chrome.exe 89 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 3576 2492 chrome.exe 91 PID 2492 wrote to memory of 4472 2492 chrome.exe 92 PID 2492 wrote to memory of 4472 2492 chrome.exe 92 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93 PID 2492 wrote to memory of 756 2492 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.adsensecustomsearchads.com/afs/ads?psid=4682008802&client=pub-9543332082073187&r=m&hl=en&rpbu=https://www.wikihow.com/wikihowto&rpqp=search&type=3&rs_tt=c&oe=utf-8&ie=utf-8&fexp=21404,17301383,17301421,17301431,17301432,17301436,71847095&client_gdprapplies=0&format=r6&nocache=6211710031067573&num=0&output=afd_ads&domain_name=www.wikihow.com&v=3&bsl=8&pac=0&u_his=2&u_tz=-300&dt=1710031067573&u_w=1920&u_h=1080&biw=1857&bih=966&psw=1857&psh=966&frm=0&uio=wi300-&cont=afscontainer1&drt=0&jsid=csa&jsv=610814804&rurl=https://www.wikihow.com/convert-jpg-to-pdf&referer=https://www.bing.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa35629758,0x7ffa35629768,0x7ffa356297782⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1860,i,9734583580235938557,15649807966501461213,131072 /prefetch:22⤵PID:3576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1860,i,9734583580235938557,15649807966501461213,131072 /prefetch:82⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1860,i,9734583580235938557,15649807966501461213,131072 /prefetch:82⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1860,i,9734583580235938557,15649807966501461213,131072 /prefetch:12⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3232 --field-trial-handle=1860,i,9734583580235938557,15649807966501461213,131072 /prefetch:12⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4672 --field-trial-handle=1860,i,9734583580235938557,15649807966501461213,131072 /prefetch:12⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3440 --field-trial-handle=1860,i,9734583580235938557,15649807966501461213,131072 /prefetch:82⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1860,i,9734583580235938557,15649807966501461213,131072 /prefetch:82⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=980 --field-trial-handle=1860,i,9734583580235938557,15649807966501461213,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5636
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD5f5b4137b040ec6bd884feee514f7c176
SHA17897677377a9ced759be35a66fdee34b391ab0ff
SHA256845aa24ba38524f33f097b0d9bae7d9112b01fa35c443be5ec1f7b0da23513e6
SHA512813b764a5650e4e3d1574172dd5d6a26f72c0ba5c8af7b0d676c62bc1b245e4563952bf33663bffc02089127b76a67f9977b0a8f18eaef22d9b4aa3abaaa7c40
-
Filesize
144B
MD570ee534dc0cfd72b664eaf51c76035ef
SHA1fabb13ffe554d58b922fce824afc84f8c1beca49
SHA25627e18d0ad2c31e45919cab2578a10223628348bc0535bb0f4056bb017f912e27
SHA512c5108995bb489beeb82ad227bddfef298ac29bfc37c3412308714bf4cee252faf353364fcaec9a43d1f9d606aacfd7bd806d40721150d29af0eb4f8e4d3496cf
-
Filesize
1KB
MD59a78866b764e703c80fe4dc81463d812
SHA1d74c5f5c333fcde7d1291ad277d67d1ab0e26238
SHA256a02b307e6bdf53737d9cda550c5dbffed9158ec943ad86542d7e6412cbb6d2ca
SHA512f4800ca69d570c3b7ef4f8f5726c36cae97dbe215fbe2115724da5d21de1d31717136ad6cfae51fc6242896c8317b230707bf73e51933a41a04c93d9a045ab67
-
Filesize
6KB
MD5e286371155547513da7c1d8a9a2bba30
SHA1d3b536130cfbfa1169d3d59a8d14ba350d0a7d1e
SHA256d4dbbe8034f5c3e1f3c3c6ecb3245db300af402a14457f9231cf371e8d992eea
SHA51289153251af5f240d799957436e035feec955c6949f7e16b5cb58a6f0d4094db86deb1c5f9f231d591c36f02553f06248766972852137e4d8a71d0362065ca1b0
-
Filesize
6KB
MD54bb99c48a40495440119a88341f095c1
SHA172fe62270126eb5ea5f298411db4a28e7acaa410
SHA256aff9ffdd96c7aa429067a66fdf1f75d23026207b73efbf3e65c3090244c25bc7
SHA512e913bf0142d675fc6e268974d3a57285ae18093ddce8e3ada27d2694ef36c7c68eeab20e50ca37da5de32e2d3f130298746dc4c5c07b81631cb6f07b4b7d1ef0
-
Filesize
128KB
MD5ac4b6ff17ba37f612c5ffcb37bf18590
SHA1a18cca46ebe77efb5082c16613296981dcff161f
SHA256342db0523f80b176a638cae3fca2f64903c39bdbfa5d69b5b4b262f243b57ad3
SHA5125063fb0962c4decc8e361b18907fc0754f9c1cf997e5a1a34cfb286bc3fc9edeb8ea9ef291a5b99e94a9c95b48c83459d809bf36a8e907229b30ac002824a50b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd