Analysis
-
max time kernel
1199s -
max time network
1173s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 10:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://pornhub.com
Resource
win10v2004-20240508-en
General
-
Target
http://pornhub.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133598091001954268" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3028 chrome.exe 3028 chrome.exe 664 chrome.exe 664 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe Token: SeShutdownPrivilege 3028 chrome.exe Token: SeCreatePagefilePrivilege 3028 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe 3028 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1064 3028 chrome.exe 82 PID 3028 wrote to memory of 1064 3028 chrome.exe 82 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 60 3028 chrome.exe 85 PID 3028 wrote to memory of 5060 3028 chrome.exe 86 PID 3028 wrote to memory of 5060 3028 chrome.exe 86 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87 PID 3028 wrote to memory of 4388 3028 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://pornhub.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff824c3ab58,0x7ff824c3ab68,0x7ff824c3ab782⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1884,i,11827620108734071980,10476113706392407371,131072 /prefetch:22⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1884,i,11827620108734071980,10476113706392407371,131072 /prefetch:82⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2160 --field-trial-handle=1884,i,11827620108734071980,10476113706392407371,131072 /prefetch:82⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1884,i,11827620108734071980,10476113706392407371,131072 /prefetch:12⤵PID:412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1884,i,11827620108734071980,10476113706392407371,131072 /prefetch:12⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4272 --field-trial-handle=1884,i,11827620108734071980,10476113706392407371,131072 /prefetch:12⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4148 --field-trial-handle=1884,i,11827620108734071980,10476113706392407371,131072 /prefetch:12⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 --field-trial-handle=1884,i,11827620108734071980,10476113706392407371,131072 /prefetch:82⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1884,i,11827620108734071980,10476113706392407371,131072 /prefetch:82⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 --field-trial-handle=1884,i,11827620108734071980,10476113706392407371,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:664
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816B
MD51ad558e82f55c1c7588c21bff74fac24
SHA1cea706a6e2573e931bb4300a90f662c87828c3ec
SHA256f26e8a66a5b89de1df3b829579be300d0eb267bc23ebfbce2dbd7d484064cd05
SHA512e801b46b68c2ecbe03c770aacfd38b8e2c74ae9cdf956ddbf522b4804622cb69f8ba930c54e4b425ba3a9071cf1eee1dc73cd6f978aa1622b9bad3f91001fd06
-
Filesize
4KB
MD50afb54312dbfc37e9b7f1f7fadfdbed9
SHA172463d06b275948e59e4f182c08ebd94c80f27d4
SHA2566e4d87b869aa0e96d3384681ff44cbdc379d2090de95a4340d7785bb9f01ac81
SHA51228e65d5d7deab60a4b2345c938cc592437682de2f2b3c14ad8643daffa33f8f886bcbd8ab2c2ea25047ca7955458133db2c36c40b4b50bdf4c962ec37531ee5f
-
Filesize
4KB
MD5b58c7ed080619933003f7799f59beb7b
SHA15b5d3f74dfe980e3bb741a176b033b658d9a6015
SHA256b59f38f8e918c773a7bb7d8ecc44f8a71b449cd631747603091cd32588995607
SHA512801794702608113b6f8c87f9b3ae0d36129cd88ac5a035ddd205133a46f080eb518cde07e36c7946ae5cc58463b03a943d21332779cefa90f9b12b3a14a8dff8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD59769710c70ebe7c397b0e494ddb1a5bc
SHA1dbe68f21f7af31cb6e840c80dbbae2fbc482ca29
SHA256a96c030bb6c3e2573054ad5306e80c86c8fb3a545d61f18064df7a515fe39b2d
SHA5123a0e4b0c4e554ad3d5cb0a8370256f09ac69787f86b3618aa323f79488be7dfb0589ef1c488e1d7c638bfcea842d0d8a777c1cc3d4c9c30690080b10ecc7c377
-
Filesize
1KB
MD593c6ffc998d63010023d8e599bc73c18
SHA1a7384ddb3efc186873b4ce6b9bda2eb959e2073d
SHA25696cdf6c832712f2bbf6167b0170e3927a71a2cd40efd0e175fc269fc3c38c59e
SHA51221f69f2867f7d2c7428eea6423d08d78b37c2fb1921b7a85e0143c4bc7b168991714934bd52c9193801889641e276058667e2b12bf7667bbfc221722f77a2020
-
Filesize
1KB
MD55667cd7e3195a904f19541c22b26740e
SHA1232e70dedb0e4aa2d3e7aa51fa4830e5b3639aa5
SHA2561de11c99bd665810d68ecfde6a08e44ef56382351fadc2fedd02faa8ea20353c
SHA512ef5134583739b1d307ce183cdcdc801fccacadfed9fba8bb3bf5611a192363782dac977082e2f6430468f1645502b29d784a0624af2d3196fe6645777d120251
-
Filesize
1KB
MD554b028201097266c4b49c24bb27e3dd7
SHA19a978d0df550597b1e3662b7f9af1de42ed9fa8b
SHA25698e0a6a183c3d085f6f1fcf0fda50696cf0ea8caf0f549cc7ef990e279cd3749
SHA512931270198c0322d309c5fcf8902913e1af18b33157ac72ad74ba313c486a9358f41ef290b2df2e6e204d1a2766d29826fffa82ea7ec4f00c8c55b520ed84dabe
-
Filesize
7KB
MD5d94cd7b9dfd542dc6a8766dcd5b1b7da
SHA13cbb387db0f1af4dd63c4ed54282a88ee882e487
SHA256912affe7874dff959d38a3b5ee0ebd10aff4b907d1c888033cdb798792798d9c
SHA5129a98e392e2a48136bdbdcf586c60db3a273f214b4ec05b1a72f0ba89b351358cc135d531047e8c4f4ae41485990567bc466345b08c3329e8949a17174d6165e1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD57620a6d20d7d383be884cf10f52cb0c7
SHA1261a102570c9181d8a6260df1832f88fd928bc29
SHA256771c9661f43701aca5c5c6b5e1043849890a8fc673406485cbd0df1dcf0ac85d
SHA5129c5a15032c17ad89bc904d24b3945155cc320006b0ce1e0e1560d6c1befe7b54003352b53876e8f786f16822153bc12e53899694b2e54b7511e6f3ebd382d1e7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe579d0b.TMP
Filesize48B
MD532613be1a4c1453bb472969982855d1f
SHA19f7f9a87272d52d8b58b0093dd3cfc15509e1ede
SHA256fcddc5698df1bcdf287e2ca9b14508e5ebcdc607dbfda4a1c40c129185582830
SHA5126aa2d12ce267aa37bc80d2e779c1494898c2fc43ec12ddc9743bea45ad4a651b897aa0ccf6fecf6ea9066d05f20c66f6f0ea54190cc3836f1a6ff16f47e61c11
-
Filesize
129KB
MD5677fb931217f6ab511aa1e92ac0e3d1a
SHA1455bf5c8b1b1e8fa2d17e8edfba0fe7a70dcaf8a
SHA256fc32f350e7b919fa3795b69636396e5ee64385df7de41fe7f06505af39030d29
SHA51257d91a44dc4b6e8c26cc22c52452b5bd1f98384e1518eecbc412b119adebf3fc0690d6e981d5e199cc5d03f3a45745f6e52585a1230ef4600f0573acf6fc72b4