Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 04:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cloudflare-ipfs.com/ipfs/QmYJc6UQTAegJsKe5v63AygVEj7FkYScZPRB9gkwJPDnju
Resource
win10v2004-20240508-en
General
-
Target
https://cloudflare-ipfs.com/ipfs/QmYJc6UQTAegJsKe5v63AygVEj7FkYScZPRB9gkwJPDnju
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 3 cloudflare-ipfs.com 11 cloudflare-ipfs.com 25 cloudflare-ipfs.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133627277379548961" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 4436 chrome.exe 4436 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe Token: SeShutdownPrivilege 1816 chrome.exe Token: SeCreatePagefilePrivilege 1816 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe 1816 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1816 wrote to memory of 940 1816 chrome.exe 82 PID 1816 wrote to memory of 940 1816 chrome.exe 82 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 4884 1816 chrome.exe 86 PID 1816 wrote to memory of 2276 1816 chrome.exe 87 PID 1816 wrote to memory of 2276 1816 chrome.exe 87 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88 PID 1816 wrote to memory of 4148 1816 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cloudflare-ipfs.com/ipfs/QmYJc6UQTAegJsKe5v63AygVEj7FkYScZPRB9gkwJPDnju1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef993ab58,0x7ffef993ab68,0x7ffef993ab782⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1800,i,190871405946469954,11443252039453459925,131072 /prefetch:22⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1800,i,190871405946469954,11443252039453459925,131072 /prefetch:82⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2168 --field-trial-handle=1800,i,190871405946469954,11443252039453459925,131072 /prefetch:82⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1800,i,190871405946469954,11443252039453459925,131072 /prefetch:12⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1800,i,190871405946469954,11443252039453459925,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 --field-trial-handle=1800,i,190871405946469954,11443252039453459925,131072 /prefetch:82⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4116 --field-trial-handle=1800,i,190871405946469954,11443252039453459925,131072 /prefetch:82⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5116 --field-trial-handle=1800,i,190871405946469954,11443252039453459925,131072 /prefetch:12⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4156 --field-trial-handle=1800,i,190871405946469954,11443252039453459925,131072 /prefetch:12⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3924 --field-trial-handle=1800,i,190871405946469954,11443252039453459925,131072 /prefetch:82⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5052 --field-trial-handle=1800,i,190871405946469954,11443252039453459925,131072 /prefetch:82⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1800,i,190871405946469954,11443252039453459925,131072 /prefetch:82⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3352 --field-trial-handle=1800,i,190871405946469954,11443252039453459925,131072 /prefetch:12⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1556 --field-trial-handle=1800,i,190871405946469954,11443252039453459925,131072 /prefetch:12⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4008 --field-trial-handle=1800,i,190871405946469954,11443252039453459925,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=1872 --field-trial-handle=1800,i,190871405946469954,11443252039453459925,131072 /prefetch:12⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5bc49e11edf74de97f0920d609ad61342
SHA1e6fc2db19128831e0cab3cf9fe30264232ff9cc6
SHA256dcd6b2f2503727c5b94160173e57963cf4cc11a898cb5c5bdfd9b46f0ecf8f7f
SHA5125d10e4dd14d0ab76d45e4fc336fd93cc9846c9136738cd59231d1313f2a71928aa9e013f91b44f7f574443efa4765020d835ffeec283af8140afd2aa5bb1d1c5
-
Filesize
257KB
MD5cbfdd866ef77c72cc072c97c77e49258
SHA1e41324790475c4a3362a5ab895b96e2454c0eddf
SHA256f8f5e41c0bcff22c16138e1f50344ccba63a3245a3d985424f4c8982952c819b
SHA5123b60ad622e2a1886734ccbd51c0086d560952639c249d896744c61f78371bb97a8588b2653b5a6cf57e380ebcf3d7a2ca540ea33036e7dc20d19fec2008b6a97
-
Filesize
257KB
MD591704e802748b373968b462fc095c1fa
SHA10e0f5a9638138b8781ff03ffcb066cee2a18edcd
SHA256b79c1e35a609d60d7d08a2883691b9c0eaef9f2839f286019b3b2d68bf57791b
SHA51233b9437ba28e20c1f130dd8b3aac185b800b35fb0c6a3ed184af2e7ed8bd1058254abf6688e3b6f51553c0e07afc6b4292484ba3c3e7c701e2cba7478b820340
-
Filesize
91KB
MD5633924b0daa495e3e6e06f927c0a1fde
SHA1248d8a111d652279ff0e1374a8c68ba89cd6b071
SHA256c016075ba2dc27e476921fb21e476b4156afe9528781acf0e25391d3d0888719
SHA5125f37d00585ae7bc329d446d03f381fc033969b41c564d08ba1caa38b4605b52fd8886d1451bf6457fd597addc82d10ff7ed05659e0a044e2205035cd423bee5c
-
Filesize
88KB
MD5424767801f1d11461334cefc46280f64
SHA1bc493037752496d78d8f16e10f7b0ac33c6f0dae
SHA2568ed115f8411d062df8112d6562a409e5f191b4877963b18995aa71b151704782
SHA5123458b990906e77a0a80d908cdfa1539c1c6533233f24520f33bf126010924bfcca73b3b7d1b37af1c4a710e08c2028eab0f0565d7fcb39bea553867db7623d8c