Analysis
-
max time kernel
1780s -
max time network
1165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 12:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.dragonsdogma.com/2/en-uk/
Resource
win10v2004-20240226-en
General
-
Target
https://www.dragonsdogma.com/2/en-uk/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 2500 msedge.exe 2500 msedge.exe 4564 identity_helper.exe 4564 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2500 wrote to memory of 4320 2500 msedge.exe 90 PID 2500 wrote to memory of 4320 2500 msedge.exe 90 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 2904 2500 msedge.exe 93 PID 2500 wrote to memory of 4444 2500 msedge.exe 94 PID 2500 wrote to memory of 4444 2500 msedge.exe 94 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95 PID 2500 wrote to memory of 3184 2500 msedge.exe 95
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.dragonsdogma.com/2/en-uk/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffd656846f8,0x7ffd65684708,0x7ffd656847182⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,7306703688417615465,16934735238267174151,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,7306703688417615465,16934735238267174151,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,7306703688417615465,16934735238267174151,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,7306703688417615465,16934735238267174151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,7306703688417615465,16934735238267174151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,7306703688417615465,16934735238267174151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,7306703688417615465,16934735238267174151,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,7306703688417615465,16934735238267174151,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,7306703688417615465,16934735238267174151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,7306703688417615465,16934735238267174151,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,7306703688417615465,16934735238267174151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,7306703688417615465,16934735238267174151,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,7306703688417615465,16934735238267174151,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:6128
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e494d16e4b331d7fc483b3ae3b2e0973
SHA1d13ca61b6404902b716f7b02f0070dec7f36edbf
SHA256a43f82254638f7e05d1fea29e83545642f163a7a852f567fb2e94f0634347165
SHA512016b0ed886b33d010c84ca080d74fa343da110db696655c94b71a4cb8eb8284748dd83e06d0891a6e1e859832b0f1d07748b11d4d1a4576bbe1bee359e218737
-
Filesize
152B
MD50764f5481d3c05f5d391a36463484b49
SHA12c96194f04e768ac9d7134bc242808e4d8aeb149
SHA256cc773d1928f4a87e10944d153c23a7b20222b6795c9a0a09b81a94c1bd026ac3
SHA512a39e4cb7064fdd7393ffe7bb3a5e672b1bdc14d878cac1c5c9ceb97787454c5a4e7f9ae0020c6d524920caf7eadc9d49e10bee8799d73ee4e8febe7e51e22224
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5e1ae855c6c932462c806295769b3e956
SHA11a6f62d28f11b5ca95aa6fe1e69169929bca954f
SHA256480d7cd721bb4e49f05ea5a09658f6b43157fc088b9594b68c48b1a7402fc442
SHA512b9b0ff43c2633105edefc4c5ee38fcfd5fff492a98124cc8bd6a9781aab262a6e040fcd0abab8b9481baf70db4511d650399b03c476803e1be5058c6d0a05255
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize552B
MD586a6227e9b715ff9c3dddb7f27a3eebb
SHA11ebdbe5a0776ff1df93a619fe2cb4c4511dced9d
SHA256b163cb58dea19a0bb8cc4cb39c571c33235b1ceb2a0d93c030c00e7a7c21d471
SHA512804de9e22082e37a80b208acecd295e235c3b40bbbd2d245a6dcb3fc343979af5a5a81de20a21f4620531c331208bb62bc415c9df06849b4b805b51a9da2231a
-
Filesize
2KB
MD59c7dd3e6115baa15b217292c838776c8
SHA17e188f31cf8600fb8100a874f6a584487e3bb8b7
SHA2564c63be748a119e367744745cfe468aa2e961a1e4863381f6b2be92ace7c22c31
SHA5125f381cb53e530076c4a351ae9e91d961af87c76be97f8fc6584cb7ae2c866e721ee05e75aa5447e1872e108b49efb8a0312c6b16e075b5668945804dcfa9da13
-
Filesize
2KB
MD5da611d617552c6cf4d2064e3a3623dd9
SHA193e075c7185da4bf35f465ce6fd04c9c3f246472
SHA256bdf8f10175d66c1a09ed9e90980a9c83bf7ed39bfe590a3f4e69d3ad500db06d
SHA512cc8a9e7db7d6844aa247df38d8cc88668cd396e1a0e7a28240fbf6cf67669f6ce41d0aab6f88a4e01776e12b58b14bf7c86bba17c4cace17891d3174391c2c0d
-
Filesize
6KB
MD5d7a5b3edb720c88f13623a4e18b2eb80
SHA128a7fde1d14a65b10789fe9226d7dac8d2ed26b9
SHA25687c5170a7fb063cd15830a34a922deb94416d40526b86e651c19f28bafdd35af
SHA5124e299e8c60cb1a87ada750b8428f1be8b0c258b1596b2243fe4f996515c021458f56ab6844a7aa54496c8be186ad23f673b2814f225800bfc056df7ddcda9af3
-
Filesize
7KB
MD5b6a84a933886c882d9aa6bf9c9ecb649
SHA1924af199e34d1772bd2394e8fe1e78c1343c61c1
SHA256e2eb100a2e197f10d2ee92c39b7542643a4ceecf93cfb3d3c05cf17544e3fd12
SHA512f74668047587dc669c81ce82177b0d8fabe5e9c185e800177e0b1d4b5fbe0ddef08b1f010f5010dd271c980242b44d4d1fb39ceee34c07209764fec01c9677d4
-
Filesize
7KB
MD5a473a3941979ecc7218638b6096ff70d
SHA1f77100c2c79f21bfaebb2b7bbedfbeb3af6cdca6
SHA256f63ebd5d325aebd77d194037c45adba736cb05944a33b245902d5987b6488b4c
SHA512c5ce5fe968ef6b5961eb11d4f2ce1b5858ce24d2dc2596fdbc251e76799b1e46d85313a3d33aa30efbca062cd0a4941ed28aa7ea23660e63ac843a4d93b87ea3
-
Filesize
7KB
MD516c62e39ce09aa8a17395725960acc7a
SHA1e02019a9b5efe7c3e1aff232a738842f83fe14aa
SHA25684dfc5d60067864b07a45d2a3781ebfc226fc592a83955d9fd623c955379b92d
SHA512153a9dc3a4ae325b9e5a7a0b1f682a40c052957a4169576562f55fff46d5d4c7d5945866d0a4e310fc5b0b90119fede0133c3ff737eff1acf7325d9cf5a4d938
-
Filesize
7KB
MD53a5de97f7dfa0c4609bcc60171130638
SHA16b689802e6f9e33fcaee285e459723658d55641d
SHA25632604bacf7be6e2468a50a4eba76b8f6ffdf9461948a42de1303ae15e743cdae
SHA51226ddbc054975be0552110c85e4d0429d02a02d7a1625cede3c3c27efea76015f451ba3d08138443b432af9e28e910bcd613898b1f31411b3b40896540f4ecb8d
-
Filesize
371B
MD5399dc49119a175c0c3f68ee6e7c5b579
SHA15a0c7e59424253dee684595493a80571d331ef6b
SHA256ad9f6c3236e927e39bcd04e4d49137a03afad80958cbd966d1a95dbbdad61278
SHA512c114e9fc4d9c90d55cfea19ae5a56852f822bcf4ce88bcc54790c0b21428717aafea5e04de222dda695fbbcaae70458aa177298ace6a5f79c85974bade56fcc7
-
Filesize
371B
MD57b9cb83c16f7e8840124929b8cdddd69
SHA1dbd70ff9bd98448e30425f0fd94b4a947ee304cf
SHA25663115d93c66af6dd040acb49f6e5918b802bb0c216b927e53ee0d0a063e560b2
SHA5122fb36f8d5fafe457bd1740fc833d7280e11affaaa8b4220e74e94a799ce53a9df1f49cd12b88fe4f408bcdb77bf8ecc1f42c3e24f3aa718a5786daabe45d3ea0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59e564446a9631751f32958f86d67131d
SHA14a5d16a1420c58df5b0dfb3792ce60eed25c36a5
SHA2562847ea189e0fb89abe68e3e4187721d0fc15e47f8f27ea4d71f1334051e27e3b
SHA512911591f012841a9e31a509215109efc6771aebe963a0fbb41b7d39e86167edbb3451daf988ce250d0822979cc5c2ec02ab0bf583d5b26f9afef90c942a553225
-
Filesize
12KB
MD539ec078bd302047ace3840cfd066d187
SHA120f1a6bd63e11c0513877f71d840a7db5583d515
SHA2565cb11fa8c06a8ca4cfd85a5a2143a2c094e6ce69c87539717996afa12e21c8ce
SHA512da291c93b2c935c228ef25aa3382568469253bf1758ef66d6e16c9b203d511f91a1e190b292475fb6cac86dd770af55bfb4dbe53b60ca60e3095c6dac97944ef