Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 12:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://6j4iu.r.ag.d.sendibm3.com/mk/cl/f/sh/1t6Af4OiGsDg0aWk3T6BP5gk2VMlvf/vJ-IHHl982Vf
Resource
win10v2004-20240508-en
General
-
Target
https://6j4iu.r.ag.d.sendibm3.com/mk/cl/f/sh/1t6Af4OiGsDg0aWk3T6BP5gk2VMlvf/vJ-IHHl982Vf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133625838479162347" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1644 chrome.exe 1644 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2800 1932 chrome.exe 81 PID 1932 wrote to memory of 2800 1932 chrome.exe 81 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 3160 1932 chrome.exe 83 PID 1932 wrote to memory of 1844 1932 chrome.exe 84 PID 1932 wrote to memory of 1844 1932 chrome.exe 84 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85 PID 1932 wrote to memory of 3648 1932 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://6j4iu.r.ag.d.sendibm3.com/mk/cl/f/sh/1t6Af4OiGsDg0aWk3T6BP5gk2VMlvf/vJ-IHHl982Vf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccc39ab58,0x7ffccc39ab68,0x7ffccc39ab782⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 --field-trial-handle=1936,i,4959814332141444885,17711496759388005769,131072 /prefetch:22⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1936,i,4959814332141444885,17711496759388005769,131072 /prefetch:82⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1936,i,4959814332141444885,17711496759388005769,131072 /prefetch:82⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1936,i,4959814332141444885,17711496759388005769,131072 /prefetch:12⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1936,i,4959814332141444885,17711496759388005769,131072 /prefetch:12⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1936,i,4959814332141444885,17711496759388005769,131072 /prefetch:82⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1936,i,4959814332141444885,17711496759388005769,131072 /prefetch:82⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5108 --field-trial-handle=1936,i,4959814332141444885,17711496759388005769,131072 /prefetch:12⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3432 --field-trial-handle=1936,i,4959814332141444885,17711496759388005769,131072 /prefetch:12⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 --field-trial-handle=1936,i,4959814332141444885,17711496759388005769,131072 /prefetch:82⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4500 --field-trial-handle=1936,i,4959814332141444885,17711496759388005769,131072 /prefetch:82⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1936,i,4959814332141444885,17711496759388005769,131072 /prefetch:82⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3908 --field-trial-handle=1936,i,4959814332141444885,17711496759388005769,131072 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2564 --field-trial-handle=1936,i,4959814332141444885,17711496759388005769,131072 /prefetch:12⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4180 --field-trial-handle=1936,i,4959814332141444885,17711496759388005769,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=1884 --field-trial-handle=1936,i,4959814332141444885,17711496759388005769,131072 /prefetch:12⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5c260e11a9aadbce07d507bbb1a933d9b
SHA10ef2a8bb301e888e0f235c7dca19d7203fd926ee
SHA25647c3e3607559e20a96a62bf4219a0d97c8544166d50ef07bfed4f83ce3afb3a1
SHA51226eaf403bb90cf797a2e5317f58858e62d03267386319d213825c938e13c1b90750c3c490f77bc6bcc13d8b818bac6d092829cd243c28fe7e056b3479230c2a0
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD54b664344db26799c7cc3fa429cf75555
SHA10597414737661f24d7b5768d8919d3f81d8ed2bf
SHA2568cfc7eb46cfa98b8b2afb5530041da4bd0e1d7f32a8b1fe798dbe9f966c2865a
SHA512c19aeab2c171cca7bcc747302b957a9baf16ba97f5dcca6c279bd5d8cecbfa1059e8c7cb653b9117a47ec59e84f55ee977b2ffca36d94c758e6c9ce847227cfe
-
Filesize
257KB
MD5445ea7675eb8c5032ecd28cfbb99cbd9
SHA186b5666787ed6445751db34eaf4552815f82e66d
SHA2564cea66b48e43df9a8b6e88b8a757397321677bf51d7b76b4561ec0d83f072b2e
SHA512a2f7f82a2306e114665f9cc77861bfcb5af6fd1aea5cbc05156cff587f0c8a9e55ddd9e6d54ab549d6d9446bb2f7c252958e22881844ec126e43a275ad7ac4a9
-
Filesize
257KB
MD58b42db10428f32513b6180783441f142
SHA19fc11f8aeee31710d74381f2b76e9c65d9805007
SHA256821232628c561e3f215ae61abedce8854c602da66bfe154099e97c7a444aee6d
SHA512b1b744007efda0eadb2dc66af34ab5a014df40d32ce1a34cebd4e73c642c74ee54dc0428779129b587fd7deea8f031f25ba1d5555bfaef2548318688ccf697a7
-
Filesize
88KB
MD5ed1f9e2018b93e5bf8754a0dc6042b43
SHA16ede68822ffc92937b9a974ea8d63dcf71be0652
SHA256955a4837f1a63d65161f604b3aa6ed3b1f8a37f55f83d75335bb617a1e5ea9ca
SHA512cd1793c025a6c86c5864ac98015a16e6d8484a44188b7b2c11d23addd6acc3117703ac9f0138922fe4bf502ca5e3fec50e545f246cd7d7ec2fca779957d32902