Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 13:51
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: FRRsultattest@test.comgfdhzIP181.215.176.83AppareilMozilla5.0WindowsNT10.0Win64x64AppleWebKit537.36KHTMLlikeGeckoChrome92.0.4515.131Safari537.36Edg92.0.902.67
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 12 drive.google.com 13 drive.google.com 10 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 69 api.ipify.org 70 api.ipify.org 73 api.ipify.org -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 948 msedge.exe 948 msedge.exe 1724 msedge.exe 1724 msedge.exe 4796 msedge.exe 4796 msedge.exe 1864 identity_helper.exe 1864 identity_helper.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 4320 1724 msedge.exe 82 PID 1724 wrote to memory of 4320 1724 msedge.exe 82 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 4528 1724 msedge.exe 83 PID 1724 wrote to memory of 948 1724 msedge.exe 84 PID 1724 wrote to memory of 948 1724 msedge.exe 84 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85 PID 1724 wrote to memory of 3912 1724 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/uc?export=download&id=1mHtC1mrhoQNs0xcgm2XuX7dtu9EPYac61⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb382446f8,0x7ffb38244708,0x7ffb382447182⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8551423797195341454,10636938730259331600,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,8551423797195341454,10636938730259331600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,8551423797195341454,10636938730259331600,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8551423797195341454,10636938730259331600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8551423797195341454,10636938730259331600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2080,8551423797195341454,10636938730259331600,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4664 /prefetch:82⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8551423797195341454,10636938730259331600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2080,8551423797195341454,10636938730259331600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8551423797195341454,10636938730259331600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8551423797195341454,10636938730259331600,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,8551423797195341454,10636938730259331600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5944 /prefetch:82⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,8551423797195341454,10636938730259331600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8551423797195341454,10636938730259331600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2240 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8551423797195341454,10636938730259331600,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8551423797195341454,10636938730259331600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8551423797195341454,10636938730259331600,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3936
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4428
-
C:\Windows\system32\charmap.exe"C:\Windows\system32\charmap.exe"1⤵PID:4148
-
C:\Windows\system32\charmap.exe"C:\Windows\system32\charmap.exe"1⤵PID:2240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
796B
MD5b146f9c0285e1f004e8d1474ec8b147c
SHA10e1b918b6eb362338bb8de63399c45ee2d7d702f
SHA256d9f2ed1b51fa5f75d7b161d509bf7e62666df2d9c28d097500eecf63956a6360
SHA5125a1bc14f0460ff412707fd67f1c53a2dfa361ec3d07a0018fa33e2fcf257aceb7f06a06255cbf4189fcecdd7504d4e2799337c0328d914bc4f1a11e16905e232
-
Filesize
5KB
MD5c8962bf5ebfafb05070d19a9a4743382
SHA1af086ddfbd3f8ea1d9c599e3ff7e2eb6abe80401
SHA2563e139a2febd31060999a27d0ae1cbf72d92ba054b3a3374d67d3205b5b0c3c2e
SHA512ed7875ea62098554ba710e7ff9aaf3e5c40a27bd77799a9640b51c365495b16c1acfba50b8656249247d64ccec2925440a78df77353afebd8b343984b6d3508e
-
Filesize
6KB
MD5ceecfcd566590abd91a4add061c9ab5f
SHA134552cf31174ffbe52d6fb637a7992943ad01e85
SHA256a7351ee5b6d85bbce987073fd1c66a59a1684468aa4734744492698d48a50f16
SHA5124d7c00276f3630f0bce3916ce8e6a83729a5b0ddab37e7be94e6498991e8ebc5dced430f6a41112fb1febdeda1f51023cab49063b723707a153bd080c79bc0e7
-
Filesize
371B
MD55c3eeeefc407127b4170c540e7495653
SHA19a4513b0616ef7a2fadcc36599f4f68a1468a3f3
SHA25612353e6c992f9308cadd72804ac46e138fa2382988bc99ac48739cdee634f868
SHA512d2049db9f72a980e05bf7b5486b020ad02f86f0c30a9dbfa6bd7b2ca2ef965e6b0e581c0f25ca49691d42bb22945c7392f1e4ff59056f3865616ea654b512bab
-
Filesize
371B
MD5988a97c5a4cfd3d62fbb506d7ffc845c
SHA1aeda88de8edde247f798df045f955ad2b36bb48c
SHA2569ebac12becd9b0c571938ffcbe3d310f61b6d45159e3bc0cc00fb79c9745ba60
SHA51211edb20267ad914cf4bbaec60754cfeb370a73488aca6eaaf2b9fd662737ad5997a6df5a3b695ca04f44c044f87347c2652e097e67b01399db780a3a0a64a9dd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD584f063c4733410306f4b0a266a479ad8
SHA10d4f7d2d70f02daa130955a6877d9a6d8433b160
SHA256eb6204080694b31f9967f180e96144c2740cd930892bab925c13021383a28079
SHA512416080a1f7c05bae55dddcce78ac3da4d42281a0464fd025fd4aa95ffe58af143bd6198b6efd48d8fcd750114a8b00deb756c00279ca9b2ccc2ee9d5afe71621
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84