Analysis
-
max time kernel
86s -
max time network
89s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2023 19:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://googleads.g.doubleclick.net/pcs/click?adurl=https://www.linkedin.com/slink?code=dQ4BVMA7#%25E-mail_address&c=R,6,65f05392-f8de-4117-b270-51af0e396896E,&typo=4
Resource
win10v2004-20230703-en
General
-
Target
https://googleads.g.doubleclick.net/pcs/click?adurl=https://www.linkedin.com/slink?code=dQ4BVMA7#%25E-mail_address&c=R,6,65f05392-f8de-4117-b270-51af0e396896E,&typo=4
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2216 msedge.exe 2216 msedge.exe 2016 msedge.exe 2016 msedge.exe 3940 identity_helper.exe 3940 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1328 2016 msedge.exe 81 PID 2016 wrote to memory of 1328 2016 msedge.exe 81 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 1612 2016 msedge.exe 82 PID 2016 wrote to memory of 2216 2016 msedge.exe 83 PID 2016 wrote to memory of 2216 2016 msedge.exe 83 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84 PID 2016 wrote to memory of 3664 2016 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://googleads.g.doubleclick.net/pcs/click?adurl=https://www.linkedin.com/slink?code=dQ4BVMA7#%25E-mail_address&c=R,6,65f05392-f8de-4117-b270-51af0e396896E,&typo=41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9014046f8,0x7ff901404708,0x7ff9014047182⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,5267012867805953869,6731933071878849834,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,5267012867805953869,6731933071878849834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,5267012867805953869,6731933071878849834,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,5267012867805953869,6731933071878849834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,5267012867805953869,6731933071878849834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,5267012867805953869,6731933071878849834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,5267012867805953869,6731933071878849834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,5267012867805953869,6731933071878849834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,5267012867805953869,6731933071878849834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,5267012867805953869,6731933071878849834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,5267012867805953869,6731933071878849834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,5267012867805953869,6731933071878849834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,5267012867805953869,6731933071878849834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:3092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3368
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58411007bafe7b1182af1ad3a1809b4f8
SHA14a78ee0762aadd53accae8bb211b8b18dc602070
SHA2561f274d0d144942d00e43fb94f9c27fc91c68dce50cd374ac6be4472b08215ca3
SHA512909e2e33b7614cb8bbd14e0dfff1b7f98f4abbf735f88292546ce3bfa665e4cb5ee4418561004e56afc5dd30d21483b05f6358dad5624c0dc3ab1ba9a3be18eb
-
Filesize
19KB
MD590280903d811c86fefb524e1f2deb09c
SHA129a1bcb96986341e0702a6b8a3e2bc6eed11299d
SHA2560cbc53304e5c796fb631612aa13f02dbaf09f4bdfdfcf2bbdf77744453826806
SHA5129d46eca8909be8d5acecf51f16559d748155b8b10bf151a2108a218502e7f2c977e6ec98d97d4b0ee442d7e0bf57d8afdef3ebc4f33f3e1f3b61104b1cbd35c8
-
Filesize
887B
MD58346ef47fb3b330f68fe3e9f76972ab5
SHA1f49f0fc794823083921e874fe68dfb205e5fd874
SHA25606ba13c9134f9bfa4012b2e669e7e491d3ed228f9e2c438973e97de156da5cf4
SHA5121490b819b78580bb07a8bdbd4529ad8a78bd4351ca963003155cffb1d3db46754de32025329fb3ea082226646e7e79cfb95a9c9995d5d53f116705862e4512bb
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5d1725e9bb8f95b02b76e23fd25bbc414
SHA1d5abc6d73b716a907ace4e7e2de99f330ba1b369
SHA256fe151599289571491e0a0c8a384c50b71cd4801e199997215583fa8a0be3e201
SHA512fd3e74b26401bd291d96c15646a51be477413423544981d0d47ffd3e22deae3a354d06e6680ab06ba49f1ca6fa1a14c9f4368fd8049c694559cbddc9ed8669eb
-
Filesize
6KB
MD539a3e12fe72e401bbbae681bfdffa411
SHA1d2af05239f998775d3171e1d5065f31b94a99dd4
SHA2568c1b83bf1d011a1d578ba62a60c88bd32e9879aaf66fc98065eb8c3c6631f1a5
SHA512fec8a61b6543a3f282037f9ad8526aae7fcbf974e04e0d2e08d97efb1012b900201b1b2185f6629d653b83a066cac37aecf190743ec5cdddb9b0d34b26679750
-
Filesize
24KB
MD58caf4d73cc5a7d5e3fb3f9f1a9d4a0cc
SHA183f8586805286b716c70ddd14a2b7ec6a4d9d0fe
SHA2560e0c905b688340512e84db6cf8af6dbdfe29195fefde15bd02e4917a2c5fda8c
SHA512084ef25ea21ee1083735c61b758281ba84b607e42d0186c35c3700b24a176ada47bf2e76ed7dadd3846f2b458c977e83835ced01cda47cdd7ab2d00e5a1a294e
-
Filesize
1KB
MD59f0a051bef451cc72e70686aaeb088c0
SHA1febc082cca4c4ebd56140a919892e161a9c4ca22
SHA2564e327fba486b47e858dd7cbf475254810c05c52a5253b12caadfbcf85f884afc
SHA512467fb6c91e2508fa5f8d32142e1bd6be3ce68b06a59d2aa499aa45a7658114a33c504743ffab17433ad09a5d7ab5459d86f7e6a77a7a139366516edb0279962f
-
Filesize
706B
MD502b13466b6c0acb453d69b95c3451880
SHA1d6fb710f8a0a83c760758f37a634ac5333f24241
SHA256ddb0e378fdd93c491e2fd40bade6b810ed477cbae11cb3ec83890733192bb51a
SHA512002d66d55d7ea6f94ad53945a190850c247b4df155bbed71c2f2c7d6ddf3f54c1b78542e215f00419b0bbdb9b344033fc0771464b5cbbec08072ed8b21b9f4b5
-
Filesize
1KB
MD53ecd442879ab149dcfa6f124a69b611d
SHA1cc2677ac3babe5a1f53e5f93a21b871fa8197368
SHA2564ecd35fe84b0bd14fb94338b0cea466b27a7366c9b40573e2348d0faaec5e179
SHA512f6a555b2c84a685784c89412e15c71f020d255d3f732284398fb6ed7cee48b7a8b8cc87f16f817966e116e3695939dba9776b0358ed50c979a47b7bf1a2f7266
-
Filesize
1KB
MD59fe96108662e1db93f5c0fd21329dd03
SHA183bb99b14e0d5f0436a32b72463c056d9804b11d
SHA25654e09f950721143ca5f7c5286f5e37e80d61e14cd8072c41f0435f351824d62e
SHA512162dee8f8d75d75c2ed540124a54ddf903a25fb12d2cf13efcf577459961a88316e236bc7206af6155ba1fe8191af667f88c2ec6d824c6101e9a52809724caee
-
Filesize
1KB
MD5328882bfb2e5a6274d079f51ea6ed7d6
SHA1d3984a9c1ffcb0704a90572d1d66cd5ab875a0dc
SHA2562683701136c3bde9713309cd5113a3a94a00115e57b2ed48ef9be7d17675ae9d
SHA5125742db2d64972f113d78b10920be562380fbe89716fdc3e5b9cc9872e92728915f6e2f804dedd0680cd225d336d9aa70083be242f689d86e325b0185f660e966
-
Filesize
539B
MD5a5c2c5bfaac25d548f1e8bcfe5ad2372
SHA1cbea8145c0ccd9dfc453494c564ea6f8b5dd7a3e
SHA256d0e5fbbccb4eb6ba29c192b8dd2ff92c9512d182c8ad6fd317bbd7b9a161204e
SHA512687bbc97799433e547b268ec4a20c8533b1a6a038ccd19047cbb3f2737962f0236f68aa0ab88cd5559aeefe1c933d24b56d6122a54ef8e67b4357bdacdc6ba92
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c6b0753a-5878-47e9-99b5-454173f30dfe.tmp
Filesize6KB
MD53bfc12a7681d3d523d5a2d587fbb27ec
SHA1f03f555f350ee685bd45fc58fdbb2cad9af17166
SHA25629e2013346f49943fdea5822bc2fceaf6d1b7c44a1904d9e4f3f1e1ea0a21c01
SHA5123540b41d8b364f66ea33c905b00eaf5365ca6b178aa0749f2d7818e2866c0abae4fafc17268b109df686ae636065137c4922bbf2e69b7da819f07860f7fa2a96
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD50d20840a89c8397b4b470fa1cc37aff5
SHA193aa807ef0c3eedc9483eb46eba1a3c954693c09
SHA256379515ebbb31b1474f0209324c3b771e5bb87ea81fcd3430237b6b9c1208ba13
SHA51242b9e84dd6e9b42b1dcd85d7054f53048ae0cb5d0e8d15ed0b62fe9fa7fc2628cf2d82002315e5f1eba47fb25b5c7305e3a8f07f8177404bcfa9fc1a5554f0d9