Analysis
-
max time kernel
94s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 19:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.roblox.com.lk/users/4983248068/profile
Resource
win10v2004-20240508-en
General
-
Target
https://www.roblox.com.lk/users/4983248068/profile
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133636445992475517" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exepid process 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exepid process 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe Token: SeShutdownPrivilege 3128 chrome.exe Token: SeCreatePagefilePrivilege 3128 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe 3128 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3128 wrote to memory of 392 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 392 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4336 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 1968 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 1968 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe PID 3128 wrote to memory of 4028 3128 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.roblox.com.lk/users/4983248068/profile1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6493ab58,0x7ffb6493ab68,0x7ffb6493ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=2008,i,12377635599692750466,12471048183299613337,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1972 --field-trial-handle=2008,i,12377635599692750466,12471048183299613337,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2136 --field-trial-handle=2008,i,12377635599692750466,12471048183299613337,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=2008,i,12377635599692750466,12471048183299613337,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2884 --field-trial-handle=2008,i,12377635599692750466,12471048183299613337,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4604 --field-trial-handle=2008,i,12377635599692750466,12471048183299613337,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4152 --field-trial-handle=2008,i,12377635599692750466,12471048183299613337,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=2008,i,12377635599692750466,12471048183299613337,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=2008,i,12377635599692750466,12471048183299613337,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4380 --field-trial-handle=2008,i,12377635599692750466,12471048183299613337,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4176 --field-trial-handle=2008,i,12377635599692750466,12471048183299613337,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 --field-trial-handle=2008,i,12377635599692750466,12471048183299613337,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4344 --field-trial-handle=2008,i,12377635599692750466,12471048183299613337,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1552 --field-trial-handle=2008,i,12377635599692750466,12471048183299613337,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD557119e1d4f43be35460e5ed63479be32
SHA153d14a8a4fd6063335e3176750651f60b949e396
SHA256dcb2efe56b580eaf34a4f32f9a3d3a3de6837f0b9fcafef866d0a54ef4083abd
SHA512b80d171a169ba8b75554ed98ed2dc963750662a34b6b6da35ce1599a980df05fcfc6cb85a12ddc8795f630fc20e4de6065f2d8fbd3ea2187c7e0e02449d02bb8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD556bb12682d50c49ffc0e54d6b1c34e20
SHA15d42b94379bef31dd70ff08166d0ca19b36ca0cf
SHA2567f4007cd36e46f573c28b7825dd4125a2a6b68d4cb764a1546e086366e178f45
SHA512e017ec7a56befab104b9f4a510fbb20eec021f84ce781410a5eeeb79339a9124a0c636a1934b025e46ac6c1576bdbc8ac7649dc99dbc0700da667b9f93e53654
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
257KB
MD5ad68785a014d61611f7e201d0a1d52be
SHA12251f6bd8be44af3f01c7fee9b6fd3e91efe47c3
SHA2565c00af5e8cafa11b6a79ec6d4b97343ee210fac219d495f4f73ca80c9fbc5ac4
SHA51286544aa63a6f6fa3eaf24a3f7816f7862c4893613202464f1df4a72e9430f19ded8e3d29ab1a5bed32aca1f5621d3fdc0f8fb4ce2c5c5a3043e2a5d2eeecfb74
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
257KB
MD53b338c66602b7b79c2de3041e83733b5
SHA1ad4f44dfa8df3a490464bab15c37a26a64153bbd
SHA2566e35697114b3485cffd8fe9a7a63a53dba077dd943670201e91591b7883030d7
SHA512d1679160f5d69b37086aa56791f82e1af81f5e168cbc76bf6d7e4bd6c0694bab985cc136a4013c0311bce8aed928d0b7e3f954c09fe160aafe4786dbee5b96d8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
91KB
MD52f313bc490af37fae1d842ac86744690
SHA116ea8e3e9a30659a4dc8721dac35af78da84e8fb
SHA256312185944d671eaaf99efe127c2a860e133f06d61170155122137f3bc98ae32a
SHA512d94874de50516128e437079a9e7c8f5211b0ab88499e7cdbbd347fdb6721dc4702e50a3c03b48e62e85b5eebb4908114819f0c71377fe011d6bbd19facf89cbb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57f08a.TMPFilesize
88KB
MD5b3793c97c9ca999db12204013260e400
SHA13cef7bf51b913f3c3f76d83a78fa18b55d9794bb
SHA256d94add93f205406ed1e646e63c5bbcfbf05216fd6dd53b637f0b0c6f9b39d218
SHA5122791e3e31f6b9d91dc0cd5cae0c2cdd861c20ae062705907e4e95b0570148026b373ded1bdbd44d2e90d2d3bb598656046db2c4efbab8a4ab9560ac4d40fd13b