Analysis
-
max time kernel
88s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 04:33
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://office.aeentrabar.com/kTNoOGHr#[email protected]
Resource
win10v2004-20241007-en
General
-
Target
https://office.aeentrabar.com/kTNoOGHr#[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133780196490585716" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3988 chrome.exe 3988 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe Token: SeShutdownPrivilege 3988 chrome.exe Token: SeCreatePagefilePrivilege 3988 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe 3988 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3988 wrote to memory of 3500 3988 chrome.exe 84 PID 3988 wrote to memory of 3500 3988 chrome.exe 84 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 3244 3988 chrome.exe 85 PID 3988 wrote to memory of 4532 3988 chrome.exe 86 PID 3988 wrote to memory of 4532 3988 chrome.exe 86 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87 PID 3988 wrote to memory of 2992 3988 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://office.aeentrabar.com/kTNoOGHr#[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff0ac5cc40,0x7fff0ac5cc4c,0x7fff0ac5cc582⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,617444565322267352,114654675315418494,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,617444565322267352,114654675315418494,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2172 /prefetch:32⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,617444565322267352,114654675315418494,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2408 /prefetch:82⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,617444565322267352,114654675315418494,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,617444565322267352,114654675315418494,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4500,i,617444565322267352,114654675315418494,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4680,i,617444565322267352,114654675315418494,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4832,i,617444565322267352,114654675315418494,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5480,i,617444565322267352,114654675315418494,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4672,i,617444565322267352,114654675315418494,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2080
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD571bff7a88416e06e42c3e0f27ecbfa40
SHA1ae4dd6701b89b492c9fa669dbc3f03e88c474cef
SHA2568b88ad02d35ee1deafaa0dbd5ec510191922390e0341df3a48cad915e2a68bd1
SHA5121ea0b6421303c34d692a3647b2c9ac3025e907f058750bbd941c2878dbf8c324649ea50ceb062400214df959e7fb2e7d944eda931eae06b80409c5b012912f23
-
Filesize
360B
MD5a13843399b5488801da5e54c0349bcaa
SHA17e9d81f3cc9c4c223ab20b14e57021a3678c91e5
SHA2561ad2d2ddaddc0e0af8e4b01c499dd9181fda91c3b2f62ca8e162cbf5b476034a
SHA512ea970ae03797a548aee86182fbe3bdb260def975bb86791c3ce579022a5af1eca22e372665f4ae4988b609b1aecb91da906c4639a4bf9d879b9aad583ff10f29
-
Filesize
3KB
MD5a140f792c34e74b36577f935dac73818
SHA15c06a570fdf2a64d0b9152b0bcda8b43edaf7887
SHA256f1c68df0efce9973870edc08a6617ee38816a763f9b849d19fb590b24f691443
SHA5123bd93630b5b7badc8baf800bc86802edfb1ea552f8682689781cf1c6b96a6162793307efe58b4261acb4e74e7f8eec3d55a9f106b1fd9615210bff8550746d5a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD52c9861c18d5b1059c3dbf76828a4866b
SHA144db3d64ba34f207b843023f3bac6982401fbc65
SHA25667e7c19e9afb3751c1fd5a87b843f86a1202374031fbe2b51fed2afb6fdbb9f8
SHA512587f0f5d92c3523da8a0d4546de6dce11f0ddb8c6f94a92789973549aedbb5edf5283a6f4cfde1e5c84abbd6c1f076f62392c959d74a2f35ce33c17f9768d1fb
-
Filesize
1KB
MD5ae42519eb97e2fe6b4841b8e7a7caf72
SHA1d6df63009fb2685ef920bacebb734e13b13f56ad
SHA2560d99211318fbabd2b1ca7e6ebcab6c9a0758d0c0b8f9ab07e7924b26a07c7bba
SHA512a2b1bce6cce54ae957d511b9ef97f205440c34feebca01b7c5d270d640070adc2c97d9c956a10d338a8fe7bb1fed4fce61c3596091b834340bcbed20e46d0ced
-
Filesize
1008B
MD57145dcbb37eed230f6cc5d016ff17ac5
SHA13d6aaf3ba2ddc0b1b24f887f515f8808b2df52cd
SHA256fbfc47ca8835e761f6421c428922e1827aaee2bf409ab2b9e47c03a7c87c727a
SHA512c9a1afb4da433e7d4b85c877b9af918e5b93b3a8278e364a18823e30f507a78cb3b94b30e458a1d1c0a885b6f2a2342f9c7e50eed015be5cb18fd8a03559fc1a
-
Filesize
9KB
MD589e93224b8046bbae17f049279a145d3
SHA1b24100ca9c6787e676986bdc3766b873256c6cd4
SHA256eb7fa9dd442439375dc7d2b73a71a9673afe149a1d9154391ba15217906d00cf
SHA5120b359025d6b0182934d98e3ab9cad950a88fcce45b342e88455e24927968b9b7a07b72d76d3bc54a1ae15af0487b1d2490f9d5c75622ac8124ea2619d6b7762e
-
Filesize
12KB
MD5b78e2b2a0ad1499e11787aba61b991ca
SHA16e6ba7dfbf954ba1c9570dba4c982ae7c4444208
SHA2566c413605f1ca0d758a1762748444a36366ac8a7b447b00d8b884c9dd7095280b
SHA512f0c04a845f351b363687b91ed6ec842307dac8ec69e9c8ae9a7b704c3d90063eb9a98d070c5bb5e544f6bb7825c3265c7f6b7d508a4dff06d4387e42aa28f4a3
-
Filesize
12KB
MD5749b829a4ca31c2a180fc4fcd50893a4
SHA15c9f0f53bb8e17366cd06e3908fe759885de9195
SHA2569ddc15696e75b5a31b65ecc7c14d157f097ea3187d2fdce660de654c10c7e81f
SHA512dc5b6aac95a28de4665a343329230726f822abeb4891493f841a131867e53304dc8318066dfe55e8447e71910d657f033648453cb7c373cf9f61f97e77ae7fc6
-
Filesize
116KB
MD5dc7abe9cc876cb4001e660de123d33d7
SHA1f55d342b634e29bc3eff4960f3e5ae76481e85d3
SHA25628280717ef4d863f7c5dac6870d2a09c865ffcaae60178fb63ab7b5d90a84d20
SHA512f7cf850719e09f954f52dabf0230d3ede54f6e038e120a8a1e7c6a2875db05797fa13e29a7d06e44a7b3687977ea6d8b2924cedd4de09a24dd8e9b121b250c92
-
Filesize
116KB
MD57c22fc5701e8246ee7323baa562982ce
SHA1627b1778c3daaebf86356bf74b9297251da2107e
SHA25655e2209bd6d3ac4e1d456f0a3ce9d22142e3f4c5f1b191b6b8472af5b27b2b84
SHA5126490a058e4fe31f36bb1ba523e21e1d474b8d1c07ac37c6cc4ee2ef1f9a02c2310873dd1079558f405e1614274e1a75e5f565e231b5e98bcb073627d46a72e5b