Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 11:14
Static task
static1
Behavioral task
behavioral1
Sample
abbf5d2b9495c706edec622e4dc53228.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
abbf5d2b9495c706edec622e4dc53228.html
Resource
win10v2004-20240226-en
General
-
Target
abbf5d2b9495c706edec622e4dc53228.html
-
Size
69KB
-
MD5
abbf5d2b9495c706edec622e4dc53228
-
SHA1
af54e1cc678b7ea63bc987310b5e89cd8861c7b0
-
SHA256
616e218dd7192ab9e0bac506d05e7c9ee5f1e9e91a3216ca0dcab5883c669ee0
-
SHA512
502405ede8ec48ca30bb82ef17eea56a802f49937e37c8def4a12262d32d1adbd612724959553536ee6e38063cd9cdc1e7e4bb391ac60ec32e014432012eac7c
-
SSDEEP
1536:zW4LMnWd2qveoE4WqEyDhHLYgkXBMOZF5tZNLvisq82eQFxHZgSeBTpWCx:K4YnWoqveX4W/gkXBMOZF57Nvisq/5Fs
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 25 sites.google.com 34 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4044 msedge.exe 4044 msedge.exe 4288 msedge.exe 4288 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4408 identity_helper.exe 4408 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe 4288 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4288 wrote to memory of 4388 4288 msedge.exe 88 PID 4288 wrote to memory of 4388 4288 msedge.exe 88 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 1456 4288 msedge.exe 89 PID 4288 wrote to memory of 4044 4288 msedge.exe 91 PID 4288 wrote to memory of 4044 4288 msedge.exe 91 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90 PID 4288 wrote to memory of 1432 4288 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\abbf5d2b9495c706edec622e4dc53228.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb073646f8,0x7ffb07364708,0x7ffb073647182⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,18286481993291816519,2606268180712045212,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:22⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,18286481993291816519,2606268180712045212,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,18286481993291816519,2606268180712045212,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18286481993291816519,2606268180712045212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18286481993291816519,2606268180712045212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18286481993291816519,2606268180712045212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1748 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18286481993291816519,2606268180712045212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,18286481993291816519,2606268180712045212,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5680 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,18286481993291816519,2606268180712045212,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 /prefetch:82⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,18286481993291816519,2606268180712045212,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18286481993291816519,2606268180712045212,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18286481993291816519,2606268180712045212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18286481993291816519,2606268180712045212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,18286481993291816519,2606268180712045212,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5facc922acc172a888908926225d390f6
SHA13b16d0643efd196b646021e79b125e51bd210b08
SHA25679027e86a206219de01366d268065d71129be220362e42abd87d3c81fed50ecc
SHA5122eb8d6c864402facc6cf0fedb1d4a90ddd87c24eef4df58a01aef074da4a37c5e724249694ac8449a0ca7ad23932fa16f19a58789c8fde568acbc310e10f1b56
-
Filesize
1KB
MD5347aa3a95d8833ff2fabcc72434ac713
SHA161d602d3e8819bba6432c98e2b42b4622ddd6987
SHA256123d51bef097f371eef7bac04b1e5e9e215dec77237759cd327b593459178d20
SHA51272230cf58d5392b1107721769694d76bab38c947705997886a22472b9903fe9ec6cfd85d840e2aafc622edd6991e66fd8be2bfcfa8883931dad6b3a9420f31b6
-
Filesize
6KB
MD5994747ac65f1b0bc866e9b915d545d04
SHA19d6cf8769932bfd898591cf66de0fc6d44b94f59
SHA2568f1f7f3269e28c39121b808918b80157d1c68a77295f450556b7023ac6a13f84
SHA512acd5d57f6d1f30ae7efb5b25bdeb940a9a82012f6d721a12a81bfb1885f69e5e9f7defc15ece3031b74271696e79903a0fecb8b6f2713f6d9ba35beb3c1c7173
-
Filesize
7KB
MD5d03d3185bbc0a2c8a1c24460eafb681f
SHA135412607fd3be6781a73bae4f39cf6b991802d98
SHA2567d6bd4a28a2c263019d681e951295c780bc5bd5b6c378d0ed1ceebae30b81f96
SHA5126e410ce518fb4220a1397445bd3908a41255afcd023d86d9ed15f1d8a1eee0ebb480273976b31105ca02c0ef4bff5d9e97b8635357a37be0feff2121284094b9
-
Filesize
6KB
MD516b45bde23796f4dccf93285b9bcbb38
SHA1bd7349b2e264e222a58a341e028c56a48e52d603
SHA256908abf8a0add791b40c9f3f546fdd3878ae987bd5a5871f667a09891ad1baa2e
SHA512f4f1567a20701acba82b06478f64dc6b0d6fe550f91a2f8c38d5ff238536aef0833b61531483393652a80758e3bff3dd706c76002284934d47720fa2819a1611
-
Filesize
7KB
MD501bfc1bf5c280cc50240bd121ca0ac2a
SHA1649da3521272c3410693329fe04dc625b8aed70b
SHA2560a12a713408d48f8059c97827061f4af0a5d30a3863171d6cd39225019d2cb4c
SHA51229e8c0dec66165b385a487438eae185f15e99682a35301a7dc7d42633c36bd4433804ab0df12dead6f5029d1d7e524ebac6af0daa9aff9041f0e3dcadc4cb756
-
Filesize
705B
MD589ffe12a0474104d83d40dc7be2dc5ae
SHA15710885a8d85cab37ced777b40f3cb130da4a16e
SHA2568f9221eccbe481f97f56f799d4d8c09ab745d4bc39dd078673caef142748a23d
SHA512269d352b9ac7394c43ef2f9e0ffd4b8f41d9585a82260bd8ddd506dd5b51b38860c98b69c3d7a0878d514f0bd466ec4b9483e06ef96c5c865664abf840b3f76c
-
Filesize
538B
MD5d0ffe25c784bab458de9444c15ebef91
SHA11671bbedb09b832c8e9adae40375eb1a51abd2ce
SHA256b7e5796323de907b3e2f7900a95fad649dbf355f9e27de61c7e95657d2a5a32c
SHA512bbcc5dea8c2870553e5d78d46fbe231ad03592a317669780f3dd744dc56faaf956a9852a580703c23369dd501b2ea6d6692f1ddd3f41f01806bf06e0814e24fc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a4bfcd9b5c8d6285ac0252ead1f56f33
SHA1c502e595636453af631c33e1fd04b043e332c557
SHA256d2c9f42cf8c98622b7b84fe042a36461d234ac3ae710e6e7b51db64fef490cc9
SHA512b5b944ed0829b05141d73ccfe5696d75cb7c7fa5e9bf0fd1c412843d710304239addecdaf012123d40c38a348afca229e2c7b19bd2f7df8c346e511b56e54cfc