Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://suite-app-trezor.com/
Resource
win7-20231215-en
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 1124 msedge.exe 1124 msedge.exe 3436 identity_helper.exe 3436 identity_helper.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1124 wrote to memory of 1016 1124 msedge.exe 85 PID 1124 wrote to memory of 1016 1124 msedge.exe 85 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 2428 1124 msedge.exe 86 PID 1124 wrote to memory of 3540 1124 msedge.exe 87 PID 1124 wrote to memory of 3540 1124 msedge.exe 87 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88 PID 1124 wrote to memory of 2692 1124 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://suite-app-trezor.com/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3d4046f8,0x7ffe3d404708,0x7ffe3d4047182⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,12422683568971038158,607939111036471287,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,12422683568971038158,607939111036471287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,12422683568971038158,607939111036471287,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12422683568971038158,607939111036471287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12422683568971038158,607939111036471287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12422683568971038158,607939111036471287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,12422683568971038158,607939111036471287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,12422683568971038158,607939111036471287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12422683568971038158,607939111036471287,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12422683568971038158,607939111036471287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12422683568971038158,607939111036471287,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12422683568971038158,607939111036471287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12422683568971038158,607939111036471287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6280 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,12422683568971038158,607939111036471287,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5308 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
Filesize
27KB
MD5e86db7e0117eaed97a00361e42852167
SHA17cdea6eaf43a2c1e24c3668b242e26f5d886bcf9
SHA2566e0a056069bb970e6ddf279acf9919fcbb0d35c29e2bf48efce65116a9fa8839
SHA51209287ccceeae7c59f0931b361383989cf5a0ef6290ee7b2622ac475ebab206ddb3c12d145ba81099d317213fd6c69b16d50eefee6fcc3c0ad0a9d781ec8af3bc
-
Filesize
43KB
MD54163063c882178f07bb63b73fed91945
SHA1cd5a798092ed7fb832660e861f4546c9d0ec3821
SHA2565937afad7004e4e94b7d096d8ac42b616c3e8b1d4b7544002357f201cfce716d
SHA5121661126d61881157a698e05f8e7044fe36865e460eaab64d7dc8f1b97c7d591e7c3d55bd9c49e7d65df98438fb2f94f397f06bfba22e1094155c3b6f4dbad12f
-
Filesize
77KB
MD5b2edfb44a4f1a73b02cc6a63ffd5ec12
SHA1053f12a4e89afe5501747de495eb80196f6273bc
SHA2562635ccf183351bef3594bf268276d28ce8bd55aeedb76d5d977613d06b9a6d76
SHA5123c864babca323407b14b564b80c1f04f1949145ef3114ebbd51cb870ed0bca46287cab55e4fca99e8d2436360bc51228d0e6639b925a4d9468e67fcc973ada49
-
Filesize
1024KB
MD5020c50d49cf407fc14aed67ee41293e5
SHA10a9fb7b5bd9cbfab666f8d21c61df85a724c11b9
SHA2568b7da47a00ccabde86bcaab2200c78cdcdc8e42f4f27b5619544edc9e408c988
SHA512a0d65c1c2797997e27b993d47968fad0089e40994b2e17844c6bc02cdbb3c59a3d5d3de67bb92586a77ec6dce81305bb4192b31915d389029870b28be8632169
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD57536ec4990bc935e82a4835e03e42a10
SHA1f23519cb472754f8a26b5712fba6772e75b1986a
SHA256a2e336106cf3a01f73fd35a81f89a297d08b4ff9540cdb67c4920fbb617107dc
SHA5128339b070b3cf408939fc188d9ed64ce1684a0c63e0117be4a704871c0c9a70e1fa83cb0e7310a9a5e147bc8c9f1cf30e7f97e23e65e470129fad8714eaa7d5e4
-
Filesize
580B
MD5205070c0675ff9ab1f4ac70195b5b7d2
SHA1cbb8fdb24847fed5e14010354c4a349b5227bcbe
SHA25694249fe54307218d36f5645761035cc1e75ce6fd374fef109f20c4b700ca6925
SHA5124fc0f5814b0a662a02032bb9bb6c4c1e52a24b0b3f4939cbe1af88025625c8306cd940724769207b32aa6089ea6d89861ee8b7c2987c772fd9bc2ccf8f38fcf2
-
Filesize
6KB
MD5df260b1d8bb80af4ae409aa0df4f8c71
SHA1a1d348fe47820bde11bdf55ca9483a45dcdc743e
SHA256f5b16600f0a23680f26912af5d4c5be0b841cd42958831cfcc8a28a6a513e34d
SHA5123ce678a02b6e9f2b743eac8c6bcab427ffe35a5aff5384858b5adf69c2a9325adabc2a398fabc685f920dc6ba2eed4a58f38bc2321c8bfa7c482d46a0366ea4f
-
Filesize
5KB
MD57dfc8a76e9717327a4a684dfa042aac9
SHA13f98099a2fc4062e4a026a6152603a98547ca82f
SHA256260a93b6b0857b064a88859cc51fa993d5a967143bd288d71f2d598731e2ddc4
SHA512ac640225e8037248a795f38a5f376e48566a7663995a9a14af50505f4146ea051d1f751496d87f54d5353ed3380f533df4515ff041b74a8ed8c3929a7c825e19
-
Filesize
6KB
MD5623558fb14e0771e4ff1306d8808881f
SHA1925088833a00a8a8ddb59e651981683ca0e1f58f
SHA256a0517a17d0c952b0891c8273c0e1cbd918fa0ccf6278a7a4fd353bf1b52b0f85
SHA51252b2fa73e33989fb268a80bdd726293f2d0dd2074ad7b8c609eed0d5159f57e0288c248de792197cbb9218cc9f33fe32036972573afc3279aa8d46b81bc0f527
-
Filesize
6KB
MD5d04e45f4ca91ebd8fad8b4af952002c2
SHA1b7db9994bb7a842fc64e75f8d39b7efb36244bf3
SHA256540c34b24ef5c345177b3a68510591e6e6af3ee5a6435cf3f86655a51fa7a256
SHA512d1678e2e42b124ae63a3d133482669bec3565a2c33a6ec93fa7e1d56aaffb03b34cd2bfc8fb1f2ecc0f538b76234a29f3e1ca483b26a0cb0a2b9ccb582f8fd9e
-
Filesize
24KB
MD5e664066e3aa135f185ed1c194b9fa1f8
SHA1358ff3c6ad0580b8ae1e5ef2a89a4e597c2efdc5
SHA25686e595be48dbc768a52d7ea62116036c024093e1302aced8c29dd6a2d9935617
SHA51258710818b5f664006a5aa418da6c8cd3f709c2265bc161f81b9dfe6cdb8304fabaa4ce9deba419fe4281623feeeaa0321f481ae5855d347c6d8cf95968ee905e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59aef728379668fa43280f64a692df00a
SHA156923853d4ac1c1ff687924d9901b1694848f528
SHA2565831bdaf04824093c371227815039401fe9a2d3a6b57125093a3de2f718c35e1
SHA512da6b33a3bdd8aee2f138917e4cd11f961788fd339138273d947a1334219e952654b9835959eac4b79d3bbea6fa279838c745158c06ca9376941eb06780c6c066