Analysis
-
max time kernel
300s -
max time network
302s -
platform
windows10-1703_x64 -
resource
win10-20240319-en -
resource tags
arch:x64arch:x86image:win10-20240319-enlocale:en-usos:windows10-1703-x64system -
submitted
15/04/2024, 07:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.infracontrol.com
Resource
win10-20240319-en
General
-
Target
http://www.infracontrol.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133576390993925210" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3028 chrome.exe 3028 chrome.exe 2380 chrome.exe 2380 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 3244 3028 chrome.exe 71 PID 3028 wrote to memory of 3244 3028 chrome.exe 71 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4268 3028 chrome.exe 73 PID 3028 wrote to memory of 4248 3028 chrome.exe 74 PID 3028 wrote to memory of 4248 3028 chrome.exe 74 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75 PID 3028 wrote to memory of 4084 3028 chrome.exe 75
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.infracontrol.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9c4fe9758,0x7ff9c4fe9768,0x7ff9c4fe97782⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1596,i,15032580874404562005,3134048375741606560,131072 /prefetch:22⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1760 --field-trial-handle=1596,i,15032580874404562005,3134048375741606560,131072 /prefetch:82⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2080 --field-trial-handle=1596,i,15032580874404562005,3134048375741606560,131072 /prefetch:82⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2720 --field-trial-handle=1596,i,15032580874404562005,3134048375741606560,131072 /prefetch:12⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2740 --field-trial-handle=1596,i,15032580874404562005,3134048375741606560,131072 /prefetch:12⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4408 --field-trial-handle=1596,i,15032580874404562005,3134048375741606560,131072 /prefetch:12⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2740 --field-trial-handle=1596,i,15032580874404562005,3134048375741606560,131072 /prefetch:12⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 --field-trial-handle=1596,i,15032580874404562005,3134048375741606560,131072 /prefetch:82⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1596,i,15032580874404562005,3134048375741606560,131072 /prefetch:82⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2620 --field-trial-handle=1596,i,15032580874404562005,3134048375741606560,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5319e0c36436ee0bf24476acbcc83565c
SHA1fb2658d5791fe5b37424119557ab8cee30acdc54
SHA256f6562ea52e056b979d6f52932ae57b7afb04486b10b0ebde22c5b51f502c69d1
SHA512ad902b9a010cf99bdedba405cad0387890a9ff90a9c91f6a3220cdceec1b08ecb97a326aef01b28d8d0aacb5f2a16f02f673e196bdb69fc68b3f636139059902
-
Filesize
888B
MD544aa2d8661b23ca300eebd3023864f63
SHA12e5a593b9148f656f6976db443d2bca3e753af87
SHA2561a41b8cc6eb9ac19ffc1c698a25c96cb0638c58ea330e5dc1d4f98af786924db
SHA512d807582b999e3900c3c62bddfeb92648e4523bd390b34189a0fd3246d57f7db6a02abfac91f71b410df504bac7d8b855eadb91d8f3a3cd845fdc99c24c89db8c
-
Filesize
2KB
MD5877e0e11a2af5ffec04eeb4b5dac467d
SHA1b116481bb2c8a2a9fa9a25f1edb6d92a56229bb9
SHA25687db35aeb070d5555e9f7fc82b32719754df6af3f2b87fc3c069c785b997603c
SHA51239286f77f466cfc163d72e36ffc094e7206df795ed851366e3945a4685d5fc438e8dc0aec318e9b3d1042bf931967203640358b1fe82370b6917ce69c674325d
-
Filesize
2KB
MD56ba00fc91ba78d7c4016782844756c0e
SHA1e594b0c7e0edce066c3155b958e0d361ae2d4fe4
SHA25643c700dab1b1cb7baf14aad470daaa838d35a1f7ebd8177dedbf0cbd6d179030
SHA5125f266261cf8439718e4e2ac5470d303cc81ffa6b619ddeaf1842746e1f83673f4818b250b3e501fb94c6e939722374d231af8ef530fa98d62b8cd42e87c5e95d
-
Filesize
706B
MD5e12422dbce59113c61ff501c5f569e83
SHA1d53fea0d697ac01a025c9717bb2a8daed3f0be81
SHA25601291cd6db779b5277c02786bdc6a2aff1bce29c3f81b66e09ba9f2a9231cc1b
SHA5123e168af209da64832df1a196880d0f7a0509e13070031f468a1dae0a414f462754f258282adf8cb0e5a4f225f42cf442841b7311c39f1f0ace53b52dead057a2
-
Filesize
706B
MD526d1b0632213e32f04f3688c0d03ab8a
SHA16d028b984141fccb74e2735ee93de5deb7be3700
SHA2568208292e2344ecd55fbcc1d976768c3c385d3a06e0b8e9fa08f569296bac9cc3
SHA512f46c766ca360666ca66dc730a1ad41ffda3a9c1ed664a1d9605735b8944f4b60cdc98180e1eff42a7d6381cc14bc46f9581eb99e19c42c023f74c3e050b44d02
-
Filesize
6KB
MD538577a266ef260c14080654ae3ae86fa
SHA1270bf4b6b9893bc07f0cd80bbabc7e1aaaa9683a
SHA256e295a093ff4f41e3373c0e94a37b5d1119e0999011f051218a90f0d892402990
SHA512c66d101b5f0b09108a6871f88f3c3ac1086e6d51f24eac361f7e2a552d0855c843af6d1b1dbc1a437c826ecdccbdad13a94d152d94757ae147aeb75a67bf9c46
-
Filesize
5KB
MD57bfd3235ec5e2c710ef322051f2f4206
SHA1263163d50218810a5b530f6bf3b9bf6c3f85501c
SHA256634bec554574efb6e3e1ded6d5058abb81be7b895ae840d2cca4d2169dbe15b0
SHA5120a76c1ce5be12796e4b9342dda75b4413287a878c2f1f382500e2dc563661d436770621ff35b89a4daba6dee34b7f7aac69bfea6d7e06bef5cdf290b9d31686c
-
Filesize
5KB
MD57dbfa53ec92b8ceb826cf9b5f40b0450
SHA1a09d616604b90892ba8656ba728e505d7f0262e4
SHA2560cc20c0994e44a6375316760ba7b0d22c74e5b3db3ae5b4462e9db801dc5129e
SHA512167f83f40d904b21c9537b001023094cdc047bc732214b2e0e27111394a95284e623060a46741a3453df09cac2e9469a036b794de109d681191d25e64ddc40ed
-
Filesize
5KB
MD56ba722726f5646efc18f867bc904e88b
SHA173b5afa9a96f84a3628dd1434bc7ee37de468b49
SHA256f142efc2997927622af2d54cdf16b58de6fd0e62c0592a36b5c70e58c92e2bbd
SHA512dc77ef340615f15530b55dc2e869d1f69a02d63926830ef895fb2b48ead90da7bef38574555e7fb7b6139f0a744a04965bb47fd2e042197ef13fa140531675ff
-
Filesize
264KB
MD5597a2677471be705d8df22a3f941f145
SHA1281242b33a7d663b6a12c9ac36ad4ff14de94b93
SHA256a9ce735c7a66a4b0d787272e138c488068483483c4aa01da78f29eff8b800006
SHA51231205a8d8a03135dd494e9f7e329fa0c4a0fa4041fde9d2bcc741da824317a9461c2f3e3350c74843b29322fce6b8c15b14b7ea8f96c888e2b8386c650e5d14e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd