Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 03:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://google.com
Resource
win10v2004-20240226-en
General
-
Target
http://google.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 468 msedge.exe 468 msedge.exe 1508 identity_helper.exe 1508 identity_helper.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 468 wrote to memory of 2868 468 msedge.exe 91 PID 468 wrote to memory of 2868 468 msedge.exe 91 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4316 468 msedge.exe 92 PID 468 wrote to memory of 4744 468 msedge.exe 93 PID 468 wrote to memory of 4744 468 msedge.exe 93 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94 PID 468 wrote to memory of 5052 468 msedge.exe 94
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9125646f8,0x7ff912564708,0x7ff9125647182⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2336 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:5636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,12116361731687026984,7216538941268725010,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD573c8d54f775a1b870efd00cb75baf547
SHA133024c5b7573c9079a3b2beba9d85e3ba35e6b0e
SHA2561ce86be0476a2a9e409fcb817126285bc4ad83efd03ee06a2f86910fe18d4d94
SHA512191344f5830cfea68499bd49073ffa7215a42265a9629d203d07849b2417c0ffdbdbf288bf2c669e91009a0d7e8bd6a6b378c92fc283049141231ca7bf4da3b8
-
Filesize
152B
MD54b206e54d55dcb61072236144d1f90f8
SHA1c2600831112447369e5b557e249f86611b05287d
SHA25687bf9a4c3564eb3d8bef70450da843ae6003271222734c4d28d9961c52782e0b
SHA512c9e8d2452368873e0622b002a0c2f8a2714b5897a09475738a9f9740122d716a9f0d3841725230d58e039564c820d32a6f3a675a7bb04bd163bab53dcb4e22f2
-
Filesize
194KB
MD5f5b4137b040ec6bd884feee514f7c176
SHA17897677377a9ced759be35a66fdee34b391ab0ff
SHA256845aa24ba38524f33f097b0d9bae7d9112b01fa35c443be5ec1f7b0da23513e6
SHA512813b764a5650e4e3d1574172dd5d6a26f72c0ba5c8af7b0d676c62bc1b245e4563952bf33663bffc02089127b76a67f9977b0a8f18eaef22d9b4aa3abaaa7c40
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5cabe8c8575ad16c4b1b1d85b6cba81cf
SHA148527279da97bd496fa96d40da90f82f7a51d880
SHA256c96a829a2b89c3551ec9879e32218b5067cddbf35d52d23d6a86a2be34aa3378
SHA5122a62d2ef315426169f9c877974be1c3125a3656cbc5389323d2571cb175f187222edb1d2b7f856f4045f777762d32f5483ba09a961df3db54a841afcbb7e12df
-
Filesize
1KB
MD52f6893d6786ddcdd98989ee5b3906381
SHA1b3df85a11a4630fd227028c32cdeed7fafc8e3a7
SHA256f1e89467bcdbeebc01016b92d4ac86845f08524c2543b4008effd63382b48974
SHA5129d35e2d234be20b8e773057bc810a36c07bd7488a464d6dd550f4d417cb1c00e2677715f499eac7c599b4a55dd8054c8718df058aaac07b78e3caa145567d2ea
-
Filesize
7KB
MD51e28e856263d37985280cb7526ce4a53
SHA15a2bf484d2e5f8d41ed365f53a26e794539637fb
SHA2560c25f5d7e191d47fd2669a6a0d16dba357402d1b0988936f3bb55fba12161bf7
SHA5122343ae39b0bc6a08a968e445cbcb5cc27ce50e719d27f7eaa39bfc4283fea074039abbb7ce66eb74f753125f01f8313ebfd0ddc5a92e6e6bc555dc89dcfde24e
-
Filesize
6KB
MD5e92c535f75e1a581c40d8da8aa51a491
SHA143cfca9a2b568d9e7bff07259079ae9c9127da0f
SHA2565aac437d6564a11b2158e885c62f597c014209e9feef659a22c3e0f55c23d30e
SHA51272d602a0c46fee8646f49392a385daf978f8f28232adc1f8b638043079cf32e08ec1aff1124ec22ee6ccb071520e1fe7d05069149d369d1bb69637d3a95a0cdf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a811913e-0933-48b0-842b-5eb5a3537faf.tmp
Filesize6KB
MD5d5ef159c8b1e777134a9a372ae04efed
SHA1517e58c216f386b0d0a94eab6ded9e3829c60d2c
SHA25608cc758b22ac63ee0f39c91007f6072bad32162299f020c98ba23513a543246d
SHA512ca772c5cf8c3c421cc405804959f3b7ccf5c4e99db62438a0f548d5032f37e9369e3b679168f9489c3216836556ef23b61459073527adc223ad6df484e0b783b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e6f611c3f065be573e3b8880052c3d22
SHA102363ed4bd2c2194a207dd2980b245ac18d07584
SHA256cb457225a755bed1a3187f2be19978a82f9b2a7ee505bd3d8af7938008d93ba6
SHA512e08770e0677babb15c478cfe5e68ed548418548718655ea3cf9578c24ed11e49ed47f239be4c753d3be16d1e53ad0799956bdaa6554f0a5d1fba1cf06383d58e