Analysis
-
max time kernel
600s -
max time network
608s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 14:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ffmpeg.org/download.html
Resource
win10v2004-20240802-en
General
-
Target
https://ffmpeg.org/download.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 3488 msedge.exe 3488 msedge.exe 1528 identity_helper.exe 1528 identity_helper.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 2012 msedge.exe 3824 msedge.exe 3824 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3488 wrote to memory of 3164 3488 msedge.exe 85 PID 3488 wrote to memory of 3164 3488 msedge.exe 85 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 4500 3488 msedge.exe 86 PID 3488 wrote to memory of 2140 3488 msedge.exe 87 PID 3488 wrote to memory of 2140 3488 msedge.exe 87 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88 PID 3488 wrote to memory of 4244 3488 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ffmpeg.org/download.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe80f946f8,0x7ffe80f94708,0x7ffe80f947182⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4860826082878886560,241310178666555803,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,4860826082878886560,241310178666555803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,4860826082878886560,241310178666555803,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4860826082878886560,241310178666555803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4860826082878886560,241310178666555803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4860826082878886560,241310178666555803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4860826082878886560,241310178666555803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4860826082878886560,241310178666555803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4860826082878886560,241310178666555803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4860826082878886560,241310178666555803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4860826082878886560,241310178666555803,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4860826082878886560,241310178666555803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,4860826082878886560,241310178666555803,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:5680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4860826082878886560,241310178666555803,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:5688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4860826082878886560,241310178666555803,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2116,4860826082878886560,241310178666555803,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5a423d03869f8050e3b8e6db8d8dfd0c6
SHA14fa7f04923cad651136e2db49cf16542a80a5908
SHA25677d502e49bbd15702cbc6c7b81e77783c94c5fb18f0c3c9cd5ab44aadbdda679
SHA5122309f1ddb0d4e0a552d09e8bf6ea4a820ee00eb18b146b4edf1d958acd03cc47a7491d481672b69f0cfc3926aa1dac93154544730ba97a6eaf488ab8b9281795
-
Filesize
852B
MD5bdf9ac0e12f8ba60bad64abb42c1aaf8
SHA1ecf221cd70fff6cd7c67c974cdfef6091c060169
SHA2569d1d79508dff559251d7ff7af724c0ec85c743fde9e45e63114de1372350fc48
SHA512140b26f12709f3b4d783e3ef49ae578a062e0e8fc6ccc6f106c1ebfba4e99f02020f33c8eb7eda392ac64df5719f81b2b53f72bbc401909049f00af5da69856e
-
Filesize
5KB
MD5ec9a8de7974fbee4105a0abd2589d15a
SHA1c181f75186343758c0b538afd22620688241f3ab
SHA25621b96634de37b1e37ab7a02e796f53c08157cf760078082456a50509cf8acb2d
SHA51261a92935d1d2bbaae58fbde481b0d1363a939391760f45391bf87ac71bd0bb12ef8908873bf49024ecdb70d17fbe638f6b783ea457a5ed4946a750ded89d1e8e
-
Filesize
6KB
MD57f746ba4d31d3e2650beda86ef43d929
SHA1fa5651bdf6483980de0ce93778fd842a6c0e6aa4
SHA25660b861c13a75ed661fd55f9770f6b326e2dd194972aee5324aee41a94c52107d
SHA5127fac8675a8df530d5700e3326867e9002187bb49e8903553a1b0ce05021d9e96cf17725a2aa6e698175a62e826835dbea98f212009daf44f70d6acaaebad88d0
-
Filesize
6KB
MD56d68ca50bb7546555620718ee1e5c16e
SHA14d88f80769b341b4d21281aed68acecff0cb18e5
SHA256fb65dc03d5cb39c5a3542093cf1ed35add81bfd61f7dacd457b9615d3c57384d
SHA512a15a31baf7c76f6c67d05de128b0975766b9b9e34aa506a4c1853e0b0646bb1ff8f780955bf85162a8d51b58b839511a9310c857b9d219e04e06442fd0a03892
-
Filesize
6KB
MD585d9fe8c41f885c2181e4810ed4a4d94
SHA15b26d4532694ce4614215a655e3e01812e037431
SHA25623d75cbcf9ebb3ad48ca9afa071ad62ff48e9add0808cc4a1af83c4c7a00d19e
SHA512b42b863cfa64c1a2b5c968aeb7d5a20ff3fff4e451e8ac1900b6162100a3098e71c088390cb6091912fe177a9ec7c9ca9f8f2ce886db3b49a796a66adfa61839
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d26484ce538a4171159f98af238849c1
SHA129d7a90f8975b93669af5209356ff0cbdec4ee9e
SHA2563230208fe7e8563fe04fc4786e4150fac696cfaae593b2b4370b4b6f42058046
SHA512dfb3019c28b32d7689e85ffb8f132186ad4899b073a2e8be63360a94fbcb9fb9fd59cae53e681212529ee3ccb41dcf3e95ebae5ec7e46dd035fdadee24194801