Analysis
-
max time kernel
50s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 13:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1CjSisWYxcb7e_XlIaiLLZYcqFYRc9XmU?usp=sharing
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/drive/folders/1CjSisWYxcb7e_XlIaiLLZYcqFYRc9XmU?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 8 drive.google.com 10 drive.google.com 4 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 3104 msedge.exe 3104 msedge.exe 4512 identity_helper.exe 4512 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3568 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3568 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3104 wrote to memory of 4928 3104 msedge.exe 83 PID 3104 wrote to memory of 4928 3104 msedge.exe 83 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 4460 3104 msedge.exe 84 PID 3104 wrote to memory of 3004 3104 msedge.exe 85 PID 3104 wrote to memory of 3004 3104 msedge.exe 85 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86 PID 3104 wrote to memory of 4060 3104 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/drive/folders/1CjSisWYxcb7e_XlIaiLLZYcqFYRc9XmU?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffd490846f8,0x7ffd49084708,0x7ffd490847182⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,1490342218509670711,6085976192913694278,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,1490342218509670711,6085976192913694278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,1490342218509670711,6085976192913694278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,1490342218509670711,6085976192913694278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,1490342218509670711,6085976192913694278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,1490342218509670711,6085976192913694278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,1490342218509670711,6085976192913694278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,1490342218509670711,6085976192913694278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,1490342218509670711,6085976192913694278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,1490342218509670711,6085976192913694278,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,1490342218509670711,6085976192913694278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,1490342218509670711,6085976192913694278,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2008,1490342218509670711,6085976192913694278,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6124 /prefetch:82⤵PID:1168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2688
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a0 0x4241⤵
- Suspicious use of AdjustPrivilegeToken
PID:3568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
28KB
MD54dd36552638146f0db4bbb586d77bbc8
SHA140eedaffe7ae31d329d039266ac9d0e684abf7c2
SHA256f6834510e1a68c8ff59e74df570dff297539a877ae77f26438a729d7b4a3b140
SHA5122f2fcff9cf628a64b0d92944fec0665d2ab361fdc670ec62cd69d4bcd48f39d93fbce17f60cbdcbc51752b536f6eedad2913eaed2f193c80bf5723284d366c92
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD54ec789481f5f76b9c0746713119621ea
SHA13c1b7785a180caee6e0d7230b9292f02c86e685d
SHA256152fa7a9520724c8b29e4c666a8741061d8be156487ae15ce1cf2f6ffeced0bd
SHA5124e86bb8f86e24c7847022d2b881c082c27b1bd15b01a5c1558eaa9fd457fcf91cfb2102bb462f006a5a5b84c61f1a6a7c7baf859d55e3795b17974c1b45a77c2
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5d6d4f6ace6ad07a14cb91c221f082b53
SHA19ff0d252ebdd4ecdea51eb17f02261f682749917
SHA25614acceafe9e545312f2073235154394aa56ed704b4980322b0ded3690c64e7db
SHA51235345883716f753bee405a67a0a3d00f950dfb979f0ef336c53c7409e2588f70f8613c90f6ec729a75fbd39a74db220fd3ead853c4b14ce1b04569238bcefd7b
-
Filesize
6KB
MD566bb424442754096afd87ac81eadc09c
SHA1cf1bfb879aa1d6d2edffe9b0188893a0c6400851
SHA256463f79d53a2fde9cc56bd373474d6becb87cbbaebb1b014f50bd795a4572be3c
SHA5128c3ae91fbb3805388d05deaf14b408cc68660d8e2ece74779f1f6a7d26ade07ebd3852a3b9845268beac8afccd5b2760107202462916cfc0f8589c047476f9fb
-
Filesize
6KB
MD587edeee5760371adbb439d6b83463397
SHA1fc1ff03e203a3f11f5704e05211d334738df847a
SHA256a06d71205b7bbd41e61e40bdfb0d463908ce524f4e51c5d2704e40f5739c0d32
SHA512250623503495267ed27a813a7f26ef95fb70d5fb25dd268448c31ad8c57bf1455d55cc89cbbb31972682d30cddcb40ee4a9de44a76b3868d5dc3d4701953f126
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\0f4c87f58e3554965c14e5072f508889705a6c84\index.txt
Filesize33B
MD5b0195b619cd45d0f8af48fc59c3d7716
SHA1d153ae8be73da841309a68f26d26642d05ac20cc
SHA25637bb3e6cd75d830156a6934fa1d1516121b37b4a220705fe32adece7b7ed927e
SHA5126d917a97131baa380386bcf2c83dffb97f832e85f9510db3df4f7cdcc35396da58e5e098fbcf3fa7867b7909c09158d091ac0432919ca685ca5c7966b88a23c9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\0f4c87f58e3554965c14e5072f508889705a6c84\index.txt~RFe580bf2.TMP
Filesize97B
MD5d192d4fd71cedfebdeed784de0d666c3
SHA10a93be1af2aa92e457566086244152d89983cd9c
SHA2563f66709b5568d1d9cfe76955fcf200bde60dc5c8521103cc9850dbfecc96d88b
SHA512fe7ac87e2134e661d9bcbb6ed009ae9d6511058ae3591a53daffcc3a5c69550690abd8dcfebc50aa58b3262a2d4e53eb895bd06944de4c3eeb488ce66172378f
-
Filesize
1KB
MD5f414cb4ceec894065908a95f9e511594
SHA14dee2c140b349a5d6ad32e4154795802f9ed89e7
SHA2560759bf1bab626a691682685e5311933839825385cd977968461d9a16d1082bc5
SHA5122ef042d70d26b90299bd7efffe8af42b79d8c51da544f07395611e5eb694944befe29158a0e42d5510748e4521aa16665a845fc4fffd2224193bdab5883deeff
-
Filesize
1KB
MD596406ff9613e7d50994dd7ce0f2cde98
SHA18f84f354d1148220a377b2e51e65a6b4fe370180
SHA2564d17d712e2f1f68a15ea752cb318e4b2b040432624a5fc8f9a09db68aa8d46a5
SHA512e5f07566a392d61fdcc7adae4c4110c2f143b9106282e080a29c52befd8617ee5a6d8a96e7bd481de6782d5341f0687bfa081c4c12458ae2723ae0039e5bbb40
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c7c80d92bcf1d6aef1759358887da8a6
SHA1c99cfadebd0d61aad06fb7e7614b08774d291c20
SHA2564572e122f5cdd8245278cf78f93767424b013e873a7ea3c5c4fd6959f5661c28
SHA5128645a5de9034aab5bc2120c39e63e69b0305b85d71a9eafd81e9139932c6dd0c0f1f9b433c01eef54f52e145db6cda37836e8e7ef3ff02841039e0d54e36df41