Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 21:17
Static task
static1
Behavioral task
behavioral1
Sample
12aca17fb6209a76474045ceb82cf48c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12aca17fb6209a76474045ceb82cf48c.exe
Resource
win10v2004-20231215-en
General
-
Target
12aca17fb6209a76474045ceb82cf48c.exe
-
Size
112KB
-
MD5
12aca17fb6209a76474045ceb82cf48c
-
SHA1
df4e7d61f73f12380bb74876fd3a53a5ad706654
-
SHA256
ff97369d1c9721baad12f8cb8e3bc1581dd46d81f4310bf53d8dfed57f8e0b37
-
SHA512
090cd8a6990fa6c61c0d83b9cf175c4668e14bac38c47a0b1d341e9fd30e4603d1f023707e7d301c1c4238d2e8bfa7387bb71e07cf9132bb0387309fa74ec4d7
-
SSDEEP
3072:EX7DItrfaocyTgfsqQOlJCeqgKJ+BChFO+Krmj5I8I:EsaocyLCWgKVFO+vzI
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2456 12aca17fb6209a76474045ceb82cf48c.exe 2456 12aca17fb6209a76474045ceb82cf48c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 936 msedge.exe 936 msedge.exe 2332 msedge.exe 2332 msedge.exe 648 identity_helper.exe 648 identity_helper.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe 936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2456 wrote to memory of 936 2456 12aca17fb6209a76474045ceb82cf48c.exe 91 PID 2456 wrote to memory of 936 2456 12aca17fb6209a76474045ceb82cf48c.exe 91 PID 936 wrote to memory of 3372 936 msedge.exe 92 PID 936 wrote to memory of 3372 936 msedge.exe 92 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 220 936 msedge.exe 94 PID 936 wrote to memory of 2332 936 msedge.exe 93 PID 936 wrote to memory of 2332 936 msedge.exe 93 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95 PID 936 wrote to memory of 4668 936 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\12aca17fb6209a76474045ceb82cf48c.exe"C:\Users\Admin\AppData\Local\Temp\12aca17fb6209a76474045ceb82cf48c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://best4games.ru/load/0-0-0-1070-202⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffff8d846f8,0x7ffff8d84708,0x7ffff8d847183⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,5791921230847290335,14127043502579061793,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5791921230847290335,14127043502579061793,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:23⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,5791921230847290335,14127043502579061793,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:83⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5791921230847290335,14127043502579061793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:13⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5791921230847290335,14127043502579061793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:13⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5791921230847290335,14127043502579061793,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:13⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5791921230847290335,14127043502579061793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:13⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,5791921230847290335,14127043502579061793,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3504 /prefetch:83⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,5791921230847290335,14127043502579061793,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3504 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5791921230847290335,14127043502579061793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:13⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,5791921230847290335,14127043502579061793,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:13⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,5791921230847290335,14127043502579061793,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d5564ccbd62bac229941d2812fc4bfba
SHA10483f8496225a0f2ca0d2151fab40e8f4f61ab6d
SHA256d259ff04090cbde3b87a54554d6e2b8a33ba81e9483acbbe3e6bad15cbde4921
SHA512300cda7933e8af577bdc1b20e6d4279d1e418cdb0571c928b1568bfea3c231ba632ccb67313ae73ddeae5586d85db95caffaedd23e973d437f8496a8c5a15025
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5ad840ebfa5bb426f724eb61e51ddcd96
SHA1d0ff99d8a94b44c307dc2f97c6250781b45f70e7
SHA2562b6240a010146b87e98ba52a63e47bfcc1e67220b46c25a42d7b57357261bfc0
SHA5125e93991da57a0f5596d0259295cb1d61cf7e975b2cc5f959d6b90b5c18eb62beca4d57f4366c8a01ac5b2c9f8d9ca5926329a17aaa62223ce2fa61d7cdadd28e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
180B
MD5e75179806fdb60b3337e8cd5b04cd6cf
SHA1434a695c7607996cc4d1a0698d9214afe4d9fd38
SHA256a121c6f8b11a0682ab639049f50ef2a1b00b3a2a565d7686cc64f501056b7b19
SHA512e1e2f888005696fb33453f369efda963c71c15270338db02d812a1ad503c1dfd2a0f693c3f6a02ca2abb7cad631524b0481141646353c7b39adf44b09bf8464f
-
Filesize
6KB
MD5f4d366a7d8cbdc6d75af20ec0225be75
SHA1a9101a72748454bce2ad472fbe37dede5f39397d
SHA2564ba2836d3aaa65623198ab0e9e73994629becf9919cc15beb03b66aea5986210
SHA512c155a5d9f36ccacb40181420644b4bedbbdb40d9ba97b3e99160d8009da7aeee45dda0759b0ac63fe24a366def64520656ca3f00ec023b8ab10c93c582a115ee
-
Filesize
5KB
MD5751c4a8e55ee6fc0ffdf167c95b43a5b
SHA1801c9b8fa101af082e69ccf7dfb51bd8a14e3127
SHA256934ed733100e3812f199a78b2cb578afaf56d5a47f0110d267fca8d6a5c6e7b8
SHA51282003605cb779370590820bce3dc7bfd4aa4e3fd5789a7c18c0d97b20766b91cf105aae27da1ab1ca109b7ee7ce8e792aa1e9a1332812cbd4b21909816e4d046
-
Filesize
24KB
MD51d1c7c7f0b54eb8ba4177f9e91af9dce
SHA12b0f0ceb9a374fec8258679c2a039fbce4aff396
SHA256555c13933eae4e0b0e992713ed8118e2980442f89fbdfb06d3914b607edbbb18
SHA5124c8930fe2c805c54c0076408aba3fbfb08c24566fba9f6a409b5b1308d39c7b26c96717d43223632f1f71d2e9e68a01b43a60031be8f1ca7a541fe0f56f4d9f2
-
Filesize
372B
MD5d844fc8997f37e4162225693cfff88d2
SHA161e27bcd1af2e0f53d96a0a1629aa3194fef27d2
SHA25679dfa7e89a5dd66231f38d77a01123eeff2445317b0b44c6ea98710fbe263ffa
SHA51280fa11c1f99e0763f836997a8ec437c665c5a6681f3c0a9aeb3a8d2879aaf359081cda9fb4ed674b7fc3f687bd8d6fdf7523bc9922730f55a1f18ca79b27b640
-
Filesize
372B
MD52fa801ef9523e3369acfec2d2b60bc3f
SHA125d803d08f0970553ca3a365bc4472f1244dc73b
SHA25619d100fd95245276ca4ae66386afaab33d502a57dd69d1d5cd57e4a4fb0d4a1b
SHA5123538b47b1a00c7c7a308a282afad21979b31d7543da250269297c966791d946fb45bba2db23327fb2fff183d9d7cc6ffb955c6454164618e0fd5f153a2393df1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD580584c8105c103ee024b82d95817be19
SHA12f2680220580404451adb53294f6706b9eb8b6ba
SHA2567e0def3eae9844c4d3181746976bf325d3ecd3553f272432129d5a51beaacce8
SHA5127a494b9f1f549f9061047361257884a6dbd763a4daaedf753d24cac98f4fb1ce20d9d8733ef7d4ae1455f572b88cf4b732256d758f3a503a7d8b4ac321dcf569
-
Filesize
23KB
MD5a64b9c1f10a5434738f6efec8a1399c9
SHA1a66e15e4125cb358c1e1998ce393f9660e4f65bb
SHA2562d863a8cebd864ce51052984bd2031d37c9b022bb80c80ec0b1ca382160ae57b
SHA51253510079aff46a1b98ff7e0055288af2dce8ec3224fa5869fca4c29b33b26bad7bddecde0ded08a07e162d1bfbcca1120c0717a6156967f944567eeb99f942ee
-
Filesize
11KB
MD551b31092bc19fff637a4b0433b2bd36e
SHA1ed35222ff897af309ce25bd7a215c08e1188c6f2
SHA25604e9d5b91cf9782066ccd043cb1cc2e5eda08b8340cc98ea5786597669f8237c
SHA512c10535cd7a1dcb07eaa4975b329effe6e6563e9946f5ed4dfa42ad50c06f1ef038aeaf62868ebe7c13745328bf3bfd0a7430105683c7fa154a4cee4116df0e7a