Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 07:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://message.cloudymeadow.com/
Resource
win10v2004-20240508-en
General
-
Target
https://message.cloudymeadow.com/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133648963420002453" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4192 chrome.exe 4192 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe Token: SeShutdownPrivilege 4920 chrome.exe Token: SeCreatePagefilePrivilege 4920 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe 4920 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4920 wrote to memory of 912 4920 chrome.exe 82 PID 4920 wrote to memory of 912 4920 chrome.exe 82 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 1148 4920 chrome.exe 83 PID 4920 wrote to memory of 3476 4920 chrome.exe 84 PID 4920 wrote to memory of 3476 4920 chrome.exe 84 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85 PID 4920 wrote to memory of 3388 4920 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://message.cloudymeadow.com/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99039ab58,0x7ff99039ab68,0x7ff99039ab782⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=1896,i,1409862471892122927,2908388414902538478,131072 /prefetch:22⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1896,i,1409862471892122927,2908388414902538478,131072 /prefetch:82⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1896,i,1409862471892122927,2908388414902538478,131072 /prefetch:82⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1896,i,1409862471892122927,2908388414902538478,131072 /prefetch:12⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1896,i,1409862471892122927,2908388414902538478,131072 /prefetch:12⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1896,i,1409862471892122927,2908388414902538478,131072 /prefetch:82⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1896,i,1409862471892122927,2908388414902538478,131072 /prefetch:82⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5104 --field-trial-handle=1896,i,1409862471892122927,2908388414902538478,131072 /prefetch:12⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3352 --field-trial-handle=1896,i,1409862471892122927,2908388414902538478,131072 /prefetch:12⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1896,i,1409862471892122927,2908388414902538478,131072 /prefetch:82⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 --field-trial-handle=1896,i,1409862471892122927,2908388414902538478,131072 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1896,i,1409862471892122927,2908388414902538478,131072 /prefetch:82⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4972 --field-trial-handle=1896,i,1409862471892122927,2908388414902538478,131072 /prefetch:12⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1560 --field-trial-handle=1896,i,1409862471892122927,2908388414902538478,131072 /prefetch:12⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4872 --field-trial-handle=1896,i,1409862471892122927,2908388414902538478,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5008 --field-trial-handle=1896,i,1409862471892122927,2908388414902538478,131072 /prefetch:12⤵PID:1032
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD577168b47dede37863edb068c9a974a3a
SHA19717fd8dbd2abe782cea08e8dc1eb16332a875ba
SHA25623f6db36e7722a890ba6272fd6692e5812d2107157827c44827242f00849b38d
SHA512509941443e913d90f841aa6688501462d409c18f29f4376e2bfc3a0c1704589ac2f93ba51fbd0e65922dacb134aaa637035b24d3ff24d020337fb77381018d81
-
Filesize
7KB
MD591f441d121200cf504a4e549e9911941
SHA16da457a7b644f351b1e41dbfed712e6b8862b809
SHA256760bc392124ae7bd3accbfd137ecd8f7359fd5e35d30486973c693b2cc7f9c80
SHA5127b9b7097d6c855a981e58307ef1e2028d982716f1ee62234c4e8eb79695221e7ca50b13fa3b6d15baa0050aa5c1555b0ab55706c194991b55bee48d9b33d8a4f
-
Filesize
257KB
MD5b73fc3716c9c8bbddfe6426d0c47d7ac
SHA121d500b3ee03d4fb5fc2b7d944965d677a92ccea
SHA256d638a7bfd0e12d3315c22018fa15ccf002b1dd1527f95a65bde43ae41d4fe718
SHA512cbe78b3b263cb399c53171286a589a3bf8a95d87b26e604bf6ca64fa7e97b736c51bcc336052136a5dbd79604705243b03f3558c3841c81deb6cb3e723de8c47
-
Filesize
257KB
MD5beba8a82c76d505b883fc5131240d8c6
SHA1b3bd4d3fa7a76586b0d4019a2de6416378c5bbf3
SHA256552a88c241cf5c45392d1adb27ca8ba48ed82bbd70dd8989322eac0eb350e4e5
SHA5127a3e5b7a903e14b5c24f84bfa8f2e60af53480f6cf18f804cadd800e152309148dea4b6c8dce44a564f161cc1476e44c755d97d1936ac8bca6731b2c5f7562b4
-
Filesize
91KB
MD51de834ee1faa532daef0b4cbd0898745
SHA16a97f0eb0d4a638e35eaf8a48184511e91a48ee2
SHA2568f01549b33fff860ed5f1ab45b5100d6a26293c24304b5cb14edd4f10ab45567
SHA512a29e49e343c886c2cb21ef3d4afd9ca23d86e8fab07a11edfb89859c2bc9bf3c5eff69b82296b6ed6e0662e5a0fa66835495a290590c92117026dfe01f00211d
-
Filesize
88KB
MD5e692480d6b7cd2344c71f6513410ba07
SHA1a21a6cdc2474955f61b38ce3eba527d26848b8ac
SHA256c5efd92d04ea5f9382b0f300225fe8ef22b7a56171534d14f06eb92e84c145e8
SHA51266d4c2ac9f3383a4fbe582cb75aedbcba41d68744375f5e277d7be5b333190eac3841d884d115277cf15160bf973e26b2f4494b9298562ea9ba442a10bb56142