Analysis
-
max time kernel
57s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
08-05-2024 07:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go.snowflake.net/MjUyLVJGTy0yMjcAAAGS9a72B9R-G7EugrqXLjJ1577zO9GFE7vHeMa0mNs1vffSSI0L8I_Cedslae91IBBHTxse0NA=
Resource
win10-20240404-en
General
-
Target
https://go.snowflake.net/MjUyLVJGTy0yMjcAAAGS9a72B9R-G7EugrqXLjJ1577zO9GFE7vHeMa0mNs1vffSSI0L8I_Cedslae91IBBHTxse0NA=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133596265115213962" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 908 chrome.exe 908 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: 33 3192 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3192 AUDIODG.EXE Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe Token: SeShutdownPrivilege 908 chrome.exe Token: SeCreatePagefilePrivilege 908 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe 908 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 908 wrote to memory of 4824 908 chrome.exe 72 PID 908 wrote to memory of 4824 908 chrome.exe 72 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 200 908 chrome.exe 74 PID 908 wrote to memory of 8 908 chrome.exe 75 PID 908 wrote to memory of 8 908 chrome.exe 75 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76 PID 908 wrote to memory of 3244 908 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://go.snowflake.net/MjUyLVJGTy0yMjcAAAGS9a72B9R-G7EugrqXLjJ1577zO9GFE7vHeMa0mNs1vffSSI0L8I_Cedslae91IBBHTxse0NA=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff98b469758,0x7ff98b469768,0x7ff98b4697782⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1760,i,16086315138995611699,8279460180539970637,131072 /prefetch:22⤵PID:200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1760,i,16086315138995611699,8279460180539970637,131072 /prefetch:82⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2108 --field-trial-handle=1760,i,16086315138995611699,8279460180539970637,131072 /prefetch:82⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2932 --field-trial-handle=1760,i,16086315138995611699,8279460180539970637,131072 /prefetch:12⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2940 --field-trial-handle=1760,i,16086315138995611699,8279460180539970637,131072 /prefetch:12⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4436 --field-trial-handle=1760,i,16086315138995611699,8279460180539970637,131072 /prefetch:12⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4848 --field-trial-handle=1760,i,16086315138995611699,8279460180539970637,131072 /prefetch:12⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3076 --field-trial-handle=1760,i,16086315138995611699,8279460180539970637,131072 /prefetch:12⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3540 --field-trial-handle=1760,i,16086315138995611699,8279460180539970637,131072 /prefetch:12⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4940 --field-trial-handle=1760,i,16086315138995611699,8279460180539970637,131072 /prefetch:82⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 --field-trial-handle=1760,i,16086315138995611699,8279460180539970637,131072 /prefetch:82⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1760,i,16086315138995611699,8279460180539970637,131072 /prefetch:82⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5156 --field-trial-handle=1760,i,16086315138995611699,8279460180539970637,131072 /prefetch:12⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3456
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3981⤵
- Suspicious use of AdjustPrivilegeToken
PID:3192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\026264d5-84bc-442d-b61f-32f3c52de38f.tmp
Filesize6KB
MD5b7564e74054a1daf8d09561524de0636
SHA12ab4ab5eb3ade4495420521f2a646b30121a9124
SHA256f5d441182aa6c3ec95dac2c312bc4ceab36828848d6bd95c2edf2c6c98036302
SHA5125dc50d26e950d737327420fea1a344aafc6ffb957a742e4bfc21691d2f8c669d78f872eecee51c99ee13ea0f878bfdba35fdf92fcfdc94ba5c6c541e6f5b6f68
-
Filesize
3KB
MD53a792ea16754e25aad255a942c2c1322
SHA1f99c4ca7b42e33244cb58eebab1ba9ee96cd6534
SHA256f622c93e523176b02282281a4e6a8cf32865b5eee5477ae444d92f58cb887e00
SHA512f62f0cbe6318e6fbb00054bf97f207ce21e113d3c1492d21b564fdf4424973445337fd36a01fa7475c95627be306c174ea8adfe20e64a261d1360b09f67e27e6
-
Filesize
2KB
MD52b126ffc5248e6e0286a1d5707a4f18f
SHA181ea96a4e87f3cef29e310ff3e59819b68c37af2
SHA256f6c367c6e08e035217a4f25008d2f948605a5065663d2c17712e2cf78c88fb83
SHA512cad862dcd5fa7968ac5eac8c3b94e69797550a55e3253eecbd8dee6701976808707fe1368cb7349dd9da7e54ef204d229c15a224b7e55edff2e89776aaaaf23a
-
Filesize
1KB
MD597e75f6df91c24839b5e82bcb5c05b7a
SHA1f98caf0f366fabdde9f14afa30adf2eeecdc991d
SHA2568c5120d27157ca15ffc605e148f3c184ec5caba51d453d221472b914651560b4
SHA512c27d112df68e1adcf4695c5a366021be90564fda8ad020d49bb891247e762a13fb80efedd699078daf94ae49e4c76e23e26aa32840457437d369366f3b9a5653
-
Filesize
1KB
MD5d9dfed5f6f277c7652a2b38d20664b56
SHA1c5a38ad281ca156f2ab43d8ec9bda46bbfaa5808
SHA25642abc2e1f249db0d5292b97020f84dff3676dda3f6b40abc93e19caa8fce1324
SHA512745292dd080f5cf74a268a0777be574a3ac73946a9158d43192eecad2365e33749e176a01c0328411b3cb5ff39b80f1b1434ce21e8309f328abcab4e37f0e419
-
Filesize
2KB
MD5f16bd8de3b3825cf5b00462f1177b59d
SHA1dc4c62a7e1ac0b4bd00866b07b92f50dd3e2b9a4
SHA256abee6767205196e592e1d90b62d1e23ea14baffe4d49e6895b2d0ce06b7ff192
SHA512528c7fefc7b9098e890183231caf20a791ee93b2f94bebfe4855229724be72bf07d1f40de905b7d47118af3034495614ff5a1b037a8866eb1beffad8b352c064
-
Filesize
6KB
MD5d38df31d951123f0cd6166f6fb80364a
SHA18b4be01c52b97647392dd8f15f160b6231eefd58
SHA256eea31d20f3308538d8b2adbf49f8b6d5eff020f9ae4db1bb7cbfea756674967c
SHA512d00e3ccb3fa7e7d660eaf7f9202a0c407902ea66d0828e6c5a0910ce29acc2c9ceb1d195ff0c6c58b9546d1f48066cfec1529986856c4f9eb819f6101649c996
-
Filesize
136KB
MD50f4c405b7265162fc512c66c2f9d0937
SHA10fed7a19620a187a7b43dfc78adbdade72605505
SHA2561876c2b37e82911305ff93ec67dc80d20099b7857efe28dc50fe476667be6492
SHA51209a66063bb5eff0f8222b6fec4661f1b65e098596f04f875b167cce8e1262c5ad603772c7ac3963e12d84d7fcfa3d683b837a30ae662d9a20301fd28a53abf76
-
Filesize
136KB
MD5c4fe082f6d2161cbf5bb0e87df64f5c8
SHA16462279db590a3651ad147b8df8ee1c629900100
SHA25619482218c622af63e7d435fe6eee5813066f7a94477d3178f5370eb8bd9a0f2a
SHA5124ac9546c3e15cefbf3439d6c9223bf3c504e00c6fa02658dd86bdfe830caba60d0c4f00fd2c3ae39328e1fb6870c2fbdc243b8653f4d51b73e39df6ead7bc02a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd