Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 19:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://exactsag.com
Resource
win10v2004-20231215-en
General
-
Target
http://exactsag.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2056 msedge.exe 2056 msedge.exe 4120 msedge.exe 4120 msedge.exe 1292 identity_helper.exe 1292 identity_helper.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4120 wrote to memory of 3200 4120 msedge.exe 85 PID 4120 wrote to memory of 3200 4120 msedge.exe 85 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 4672 4120 msedge.exe 86 PID 4120 wrote to memory of 2056 4120 msedge.exe 87 PID 4120 wrote to memory of 2056 4120 msedge.exe 87 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88 PID 4120 wrote to memory of 3752 4120 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://exactsag.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc96ae46f8,0x7ffc96ae4708,0x7ffc96ae47182⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11571051486349346701,11875424915327936369,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,11571051486349346701,11875424915327936369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,11571051486349346701,11875424915327936369,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11571051486349346701,11875424915327936369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11571051486349346701,11875424915327936369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11571051486349346701,11875424915327936369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11571051486349346701,11875424915327936369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,11571051486349346701,11875424915327936369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11571051486349346701,11875424915327936369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11571051486349346701,11875424915327936369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11571051486349346701,11875424915327936369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2224 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11571051486349346701,11875424915327936369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11571051486349346701,11875424915327936369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,11571051486349346701,11875424915327936369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11571051486349346701,11875424915327936369,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5731807474749ddf8650e333e12ca72af
SHA1cc0ce7dc7070174ba6a4cf63ca8c232866a7b574
SHA256404a14128d086a728f54359ee514f8e779e02c0ffa0e6f58f41cdbbceefb37ae
SHA512b72cc2853451cab634f4d45122132de7ce740d1d769f6ccaa79b830ef807be19587100ebfca47b822db37f72d50c29108a2d0119994a4f96c81397feba59edc6
-
Filesize
1KB
MD51d046bbc53ac6854ba7cf47859440393
SHA15990ab7f3a4e38cb8b4ad850679aea3a6d192bff
SHA256c32a3de79302a1703e451f53defb3fc6dc5426a41b26ff3cebba87ff24e06690
SHA5127fcd04f559bc819454a4fb91f90dc95d0bfe0649d8c4f0c9aaba4f0901e370fc108d5d235379cc9146696bc28ffe60e9a23287cdaf75faa43014b6e5e79cfa8b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5f447ca6067d610b9962dcb9edcff14ab
SHA154fd19c9401c9d9739966087ef2d6a04260b220d
SHA2561223f0ed5d8e8d2a46eda0366274630bd97d9db958e9bc1984bb4190217670a9
SHA512f39ecce98fa2fe9a28a14f720e4c1732b41ec26126aa6d64dce4b38f5470cf6dcb36d9632ebbfdbeb381c19c327d36325521fec8217c14e59029d32f01736d3b
-
Filesize
6KB
MD55a6f463701f2d4b072ffbe899d7098e7
SHA188575ebaaaed03ea8faa696d2001c1b3c670a86c
SHA2564febfe679dfa0c70904814c74f779c595e5bbdf2777436aa1e3a26be47d2bd23
SHA512498228fcaab0bc443b7e5c20fdbadc640fc996eb45223bff0c3bed72e9392275b173409b52f1cbc25b1c00c8f62e92546e97d8e96b62c0826138c364cdef7d8d
-
Filesize
6KB
MD55ad4d2afa293c4c86c1f3d7578ef943c
SHA116538f8d419ae43cf552b9ff17e1447b07bc4cbe
SHA256f4655ad2d8e19ef9bba9715ea7ce3c40bf3fa4f28858f28dd7d30b3e184bd72a
SHA51269f86acae4d6a052a7e276231660cffb685db97e86f251be5071b0be1ab555680df6e514079defcb7eb3e7a465852cc68518735acbce5569be6f6e97583826ed
-
Filesize
5KB
MD5335db4f764acb881d36f4103e59274d4
SHA131f1e7beecb205bdf007b99062f7ef62f9d0d58b
SHA2562f78ff6b9260839667dc511be08c8fb11a0510ba86cd19c55d0b09208018e60b
SHA512ed89a81202fb48fd54438972b07f2758956b51d0643985a02bf9abfb7806c11071071a8a6f252a06cd8679a4029bdf0ee74294712394e556f4023820f5b183e4
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
372B
MD5cb073638cf7bcec27081a0563c6b637b
SHA13042b94ca1a65eba507eea42d9a56fbfa446d34d
SHA2568931a315f9114d9cfcba1d274cf9cec0645b4601e3c6d5ee17014ad6c5880d26
SHA51226e63752c92b1b3ee0afc43db27238c86ba858ba496601d086a0005c9d40aabcad6a380179d7c5714fb72752012cd3abe0915d82af6160058a60806c2fe75ea8
-
Filesize
372B
MD56d918467c796082f6a4652169e391092
SHA16e9f1448f6100543d74479cb82b720e20e6d8bbf
SHA2565f782e96f71b703f86b9bce740b1059549c78df6c313ffee6ee3bd71a211d116
SHA5126036c321f5e8608baa17d432e762f806d60e0831db18cccd10b849d12be212df9e57c2619a64e6cc172e0727560b2bb40a6917e81d5533b6b694361061535afa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52dcb0b980ef04f74019fc776a2a4ca31
SHA10665d7c5a08dec580d5563310e595c2ae6e9e0e3
SHA256cc19513acf0c987394e82f816a3e53c99f1527ee203551a25ab82d3cb82fd819
SHA5127bc8eed7c3f9fac5e5846215b71f1a22bde519e0045a8533f13aaaab397f371fcb8ceedd9e470f1fdaa70813a555cf298dcbd6fc17536488823938d776440294