Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 10:17
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240508-en
General
-
Target
sample.html
-
Size
67KB
-
MD5
a8197c877d0975be64abc8bfa8de8a5d
-
SHA1
262f5eac63efa7c0147a0bf11a4fefb63b9c9d7d
-
SHA256
fa4df056e4765db9f19044b6b3e431bce2497d6f7c0b21cbab17830a5203bbd8
-
SHA512
2e03fa7ccdc0ea1ffc3ef2e2835cfd9440b4639d52978c578d5b2f61bf5fedce80647da80adb7cb0e78d6b39355b325a1475c5e3f113b197a723aa694e7c88b7
-
SSDEEP
1536:fq1EynZYJSjpFNaYH45tK4f2y24UO74h6Rx4NJEh4fc143Vd4hp74yOEa4/RdaNZ:fq1EynZYiH+8kDdaNXo5YXMxINx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4428 msedge.exe 4428 msedge.exe 5036 msedge.exe 5036 msedge.exe 1372 identity_helper.exe 1372 identity_helper.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5036 wrote to memory of 1880 5036 msedge.exe 82 PID 5036 wrote to memory of 1880 5036 msedge.exe 82 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4084 5036 msedge.exe 83 PID 5036 wrote to memory of 4428 5036 msedge.exe 84 PID 5036 wrote to memory of 4428 5036 msedge.exe 84 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85 PID 5036 wrote to memory of 2636 5036 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8591c46f8,0x7ff8591c4708,0x7ff8591c47182⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:22⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1928 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,10933090986011864007,3145951052913414025,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
904B
MD5ddf985494b09d30c7fce3644452682b0
SHA1d0693271bb6d91f12e1cf0982a814826dc03c1a1
SHA2563bafb9a18d219f2d5f74dea8b020e9fa722b7f2dd6df257cef7da7b83262a780
SHA5124eb25d0b5ec8bad702ac0f1a1d4d7f1d6b96568d7c260bd386db28100089ce54580f8186032586a6d9f203e6db40f466fe26f7d7f1a1e2ecda5f5bd74c73a5ca
-
Filesize
6KB
MD513447f6507c4fb2a88da58020a7c25ae
SHA1f68994244f3c2e7ebd3ac1612954a5036da1365b
SHA2563394212e06ae1ec65187badff2e1f86aef38dc45bd011a6ede151bb9e2b98d65
SHA512be10136aa808847b932381eea9917e52669bd20ca2eda7f06afbe10f0ad85e17b34ab0f626d68cd464a286d4ecc28f1a050e554d2607db09fc3d00cfe67fdf9d
-
Filesize
6KB
MD5a713acf5799854cd4ec7675ac4e1d9c8
SHA180c955c776b37b7a29879fa75a89bff6998fed93
SHA256dd8b6733b265bee60d60b271a42c4cc6b0bbd39100d0b31eb64468170b6b4415
SHA512c9b87c3d296cd7ffe2076b8277b734ddfad0a8a987fb8612942dda0419151e7d390253623d5b9c3c576b47ee6885c4a1d2f50f64a964dbf95560bab8f31af76e
-
Filesize
6KB
MD55ec959ca0f5ee544aa15d842e086b302
SHA179c52642a951d72baf8605413668739c38ad9ccf
SHA2565944683824610e76707cc28930568259eac5ccec9f6b95d831e61fd9f047609a
SHA512d71dd9faa4cd38975427981b6af4c58561301c7f6ad290002258a64857de30929fb29554d790a4c3b05c5c456d879c8b28aea05b33e87394aac1155b6f682ec9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5aa5611f8d788056a7387136e510145b8
SHA16dfedddffbc52a38fd32882a951f0e9f62007951
SHA256f8b71b39d98cdf62593a176d3bcf5bfd7faeb8db8a9b8d572910d381891d2412
SHA512ce0ec2c182a4f2527003c54bc96f6f8d76adfdec061b5e63d19f150aff2f7c1725c3969a68f44540e893fb515ae249181676ceae2a024e62e2e2a7a1a9e4fbbc