Analysis
-
max time kernel
240s -
max time network
260s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-en -
resource tags
arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 15:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://robloxscripts.net/furk-ultra-roblox-exploit-download
Resource
win10v2004-20240220-en
General
-
Target
https://robloxscripts.net/furk-ultra-roblox-exploit-download
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 4976 msedge.exe 4976 msedge.exe 4312 identity_helper.exe 4312 identity_helper.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4976 wrote to memory of 4796 4976 msedge.exe 86 PID 4976 wrote to memory of 4796 4976 msedge.exe 86 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 2952 4976 msedge.exe 88 PID 4976 wrote to memory of 4548 4976 msedge.exe 87 PID 4976 wrote to memory of 4548 4976 msedge.exe 87 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89 PID 4976 wrote to memory of 2380 4976 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://robloxscripts.net/furk-ultra-roblox-exploit-download1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9276e46f8,0x7ff9276e4708,0x7ff9276e47182⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,2420866708038965747,8101697120949807749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,2420866708038965747,8101697120949807749,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,2420866708038965747,8101697120949807749,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2420866708038965747,8101697120949807749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2420866708038965747,8101697120949807749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2420866708038965747,8101697120949807749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2420866708038965747,8101697120949807749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2420866708038965747,8101697120949807749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,2420866708038965747,8101697120949807749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,2420866708038965747,8101697120949807749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2420866708038965747,8101697120949807749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2420866708038965747,8101697120949807749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2420866708038965747,8101697120949807749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,2420866708038965747,8101697120949807749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,2420866708038965747,8101697120949807749,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b1f40e0d6ceaf161dfc1dfdddcfc44af
SHA1b6557a6331b4c54efb30597ad4da0be03013a23e
SHA256065557e5cddcc8022528dc82c5fd618ca28c153d6e34978d2ba84d33227eed48
SHA5120d7fd3eabf2d2b426c627531b29e433cab175232c169a77623213b7b9935458b3067a2860137b030235526e49ca4df6867534135cf9da60697d6fa43441e7818
-
Filesize
152B
MD518bc1d880e1a43364e572a20540c025b
SHA193b7043da91e7697d7268a52ca9a434a55ddbb75
SHA25611fcaea6cf095ba038a344829e699198e7c981149f15e30a51229b8dbca6937f
SHA5123e8ca38dbd4d9aa865fdfa359033fb47f581b93842f1ccb667f243cc630bfabf8390cbf8ed1de6110b18819f0d831312304806667bc68fdd13ea1bb09b44742e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD57cce171cb87d5ef2ade22a4b57a62352
SHA11c6911f70e0d68ae8a9ff2abcf683f3e4e8b629d
SHA2567f722dee7dd6db2b487a7ea337e2ffe1e40a5ca8774b23529efca3612dac514d
SHA51200d83f5d7a352c0f8b034f52ce99b8187ea913024e88af9ec4b2b4c8d748279839e4ef9c1fc61c9eb08d1c0882c62c12c2d4c451372b556ee153d95f4b5ab81b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize552B
MD5068fd0fa88b7c1b3466083a0ad0f4caa
SHA152213b11c0d9eb3b8215209b77850bb8063de657
SHA256289a0364acb145dfc0fca2817eca413a2d24b9b64a74f74a8138d846033178c5
SHA512a65debb928b398137fdc67a2d8641dedddc72a547bf6d0ffa839c22cf0a496e4ca59fb2089bb9c0df87522c5a8c02ed4bf1ff595fbda06493141887fc314192d
-
Filesize
4KB
MD5c1bd243da1300a5d7fc22601f98ef06b
SHA195ab49b565c34ed42274df3a21be779cd9d82e8a
SHA25615049ee22daa665ce19dcee0a4283be7b979cb8313c531b6976da00de0c1658e
SHA512a25eccac1d14c3e8faddcf71bc9bb7124e7a5884323910d7e418eb9ceca4fa13da8fceea0ecf126e916ea1a4b1a5b468ca687f57c62a262e507c059b4307fc74
-
Filesize
4KB
MD5ed86c98664dfe12427bb96aa17d5dd11
SHA10559b7cff7acc13cd5785916184e863c9128c0ce
SHA256dbf74607570325a29ce993105ff63623cf928cccb5e56e723a1a9ebb597a441a
SHA5122871a76f3e14b02c33182c8fc8679a8af43b79d89e95fe541b5ab7ccff24e2d77431b180d2feefb58fee263a91713e4c46fbe5ece55eda138c5d9e159ed2d473
-
Filesize
4KB
MD522ee91f9c301a269880cbf0b10ff666c
SHA1872f6af57537e4d7901d400bbd8bbde8e1aa85c2
SHA2569119138c30a4792e571bee61211799d524f00c4bdef0f192c54c52516a5e626c
SHA512aa246216cc486a7fe7000ef2c8810a70726e06343b374e5be5bfc23aad123a851c36a990bf41099df0cea9293c358e3858e631f062965d37481ec7d81a4d99ed
-
Filesize
6KB
MD5a6250250e706807270d0a9b22fcbe3d5
SHA1b03a8129ba8fc3d7444d5871f2ba3ca0e890f4f2
SHA256987316d0946ffbc8070ad16b3a5789f4534e5b3d9d204254137dca5acc75c214
SHA512dcfae23bee32dcd9914f6c9bead0937cf9ebb4143a38226c13517315f81b5db63b3fd729a903f170bda8e7822d5c4ab847755b67cbbd604bac19890d07dd349c
-
Filesize
7KB
MD53e9ba0ee2915acd7459953f463315170
SHA1e59f58dd99f317156b40b3e9487104af18a30be7
SHA256c462bfcc274d08c047b4a7fcf270b47c7f60b4976e049d6e57c9b8e796ce7e16
SHA512c85edd0fb2100838020d43d0badf6cc1b790597b02c0ad2e001bf6ee532e585baab3c467d450147bc03ca50fe100bee773d09c2fa25e20800893a286864be2a8
-
Filesize
7KB
MD554eded34dc615e199b23161447f2549d
SHA171bae29aa6d3d505da1e4b98808d4484460cd572
SHA25651f202a3b1eb4ff570316040e3f5b964599a1fde911bb586b1a293ec741a5d32
SHA512d4293d1670f6afbbf80c51fe9e4a715b55a0502a79746370494ce2d2924fa162f27af6828442c06648cefae93f0acdc465b0f5c68709dfadf5044fe3ebbfc235
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD541904f5cf93f28a70de2becb5b7ee916
SHA1f0e27db4b34af01375d845f9dec9b6e05f977e0b
SHA256a806004efdac18b785496a98a54fb01cbc2fb2b39d08b7d45bc19dafeb0f20d0
SHA512456f000d9bb049e8a681488bad7751b9882042a76fe482cf343860af5e7b36379b9a3d223c65c72f8510e74704cf5cb0feb359d878bc0c20d4f7d868912b34a0