Overview
overview
7Static
static
3Silent Cli....8.exe
windows11-21h2-x64
$PLUGINSDI...er.dll
windows11-21h2-x64
1$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...ll.dll
windows11-21h2-x64
3LICENSES.c...m.html
windows11-21h2-x64
1Silent Client.exe
windows11-21h2-x64
3d3dcompiler_47.dll
windows11-21h2-x64
1ffmpeg.dll
windows11-21h2-x64
1libEGL.dll
windows11-21h2-x64
1libGLESv2.dll
windows11-21h2-x64
1resources/app.js
windows11-21h2-x64
3resources/...r.html
windows11-21h2-x64
1resources/...ter.js
windows11-21h2-x64
3resources/elevate.exe
windows11-21h2-x64
1vk_swiftshader.dll
windows11-21h2-x64
1vulkan-1.dll
windows11-21h2-x64
1$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDI...7z.dll
windows11-21h2-x64
3$R0/Uninst...nt.exe
windows11-21h2-x64
7$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...ll.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-07-2024 15:37
Static task
static1
Behavioral task
behavioral1
Sample
Silent Client Setup 4.1.8.exe
Resource
win11-20240709-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win11-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240709-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/WinShell.dll
Resource
win11-20240709-en
Behavioral task
behavioral6
Sample
LICENSES.chromium.html
Resource
win11-20240709-en
Behavioral task
behavioral7
Sample
Silent Client.exe
Resource
win11-20240709-en
Behavioral task
behavioral8
Sample
d3dcompiler_47.dll
Resource
win11-20240709-en
Behavioral task
behavioral9
Sample
ffmpeg.dll
Resource
win11-20240709-en
Behavioral task
behavioral10
Sample
libEGL.dll
Resource
win11-20240709-en
Behavioral task
behavioral11
Sample
libGLESv2.dll
Resource
win11-20240709-en
Behavioral task
behavioral12
Sample
resources/app.js
Resource
win11-20240709-en
Behavioral task
behavioral13
Sample
resources/assets/updater/updater.html
Resource
win11-20240709-en
Behavioral task
behavioral14
Sample
resources/assets/updater/updater.js
Resource
win11-20240709-en
Behavioral task
behavioral15
Sample
resources/elevate.exe
Resource
win11-20240709-en
Behavioral task
behavioral16
Sample
vk_swiftshader.dll
Resource
win11-20240709-en
Behavioral task
behavioral17
Sample
vulkan-1.dll
Resource
win11-20240709-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240709-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win11-20240709-en
Behavioral task
behavioral20
Sample
$R0/Uninstall Silent Client.exe
Resource
win11-20240709-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240709-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240709-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/WinShell.dll
Resource
win11-20240709-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240709-en
General
-
Target
resources/assets/updater/updater.html
-
Size
423B
-
MD5
80ca9f9545a5cb816ec202c5ac7cc6d8
-
SHA1
383035241b86667aa8cc192d675706974e89eeef
-
SHA256
6ab2c4f63e9c6fb6b29315b9a0909f0977d935e61027603dc4773f1f673848ab
-
SHA512
a78d8c9ae1cc2e40a113c1843bb03efe7a09ab1125338681a580bf2457efa582a3c4c72c61b3a3e06849d9fe200a2005648ac8276533f583abf7fe03eb8a786a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2456 msedge.exe 2456 msedge.exe 4308 msedge.exe 4308 msedge.exe 2756 identity_helper.exe 2756 identity_helper.exe 1848 msedge.exe 1848 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4308 wrote to memory of 2760 4308 msedge.exe 81 PID 4308 wrote to memory of 2760 4308 msedge.exe 81 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2924 4308 msedge.exe 82 PID 4308 wrote to memory of 2456 4308 msedge.exe 83 PID 4308 wrote to memory of 2456 4308 msedge.exe 83 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84 PID 4308 wrote to memory of 1388 4308 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\resources\assets\updater\updater.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd8f0f3cb8,0x7ffd8f0f3cc8,0x7ffd8f0f3cd82⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,969350678674546217,7390926206805542802,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1820 /prefetch:22⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1884,969350678674546217,7390926206805542802,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1884,969350678674546217,7390926206805542802,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:82⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,969350678674546217,7390926206805542802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,969350678674546217,7390926206805542802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1884,969350678674546217,7390926206805542802,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1884,969350678674546217,7390926206805542802,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,969350678674546217,7390926206805542802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,969350678674546217,7390926206805542802,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,969350678674546217,7390926206805542802,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,969350678674546217,7390926206805542802,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,969350678674546217,7390926206805542802,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bb87c05bdde5672940b661f7cf6c188e
SHA1476f902e4743e846c500423fb7e195151f22f3b5
SHA2567b7f02109a9d1f4b5b57ca376fcacd34f894d2c80584630c3733f2a41dddf063
SHA512c60d8b260d98ced6fe283ca6fed06e5f4640e9de2609bcfbfa176da1d0744b7f68acabfa66f35455e68cad8be1e2cfc9b5046463e13ae5f33bbbf87a005d1e0b
-
Filesize
152B
MD55478498cbfa587d1d55a9ca5598bf6b9
SHA182fedfb941371c42f041f891ea8eb9fe4cf7dcc8
SHA256a4e82ce07a482da1a3a3ba11fcceee197c6b2b42608320c4f3e67f1c6a6d6606
SHA5127641a2f3cc7321b1277c58a47dfd71be087f67f8b57dca6e72bd4e1b664f36151cd723e03ea348835581bcb773eb97911f985d5ee770d4d1b8b6f7849ce74b44
-
Filesize
586B
MD53610b7c19542becd50b7dae9f9fbb636
SHA1e2e59bfc17394337f296213d5a795ba7f1e26cbd
SHA25690d7269e9c1ca62f69b7b9082a296a3dcaade59d994a0a156481b0e2e9519bf9
SHA5120deb0881cdfb0c1761efcd1288cda24e34360f1cf8644983733fcf2e67f56990eb363947e5c9897b8d48321890ec8ef1c76c2f955db8c4b600d9c1f16be74811
-
Filesize
5KB
MD5cb9b9e3e5c75d492fa0ad9638d00b6bf
SHA176d2c2a323d5deeca67ff4f19e7f38fd597d730c
SHA25639b122a23bf8089391bcc76b0af04cd518a7192999fb0f9fc7d5a00ac79b5bf3
SHA512e499d9491f25a4b141160c12904ccd20f9e670f47d2c4fcac40ab7328fe6099aae035bf1fd7732580b31a89a0ffd13ddd3dcbef000501598e3029fedfb4ae47b
-
Filesize
5KB
MD58c373053e020869f646dd8d9232a835d
SHA151650ff9576235568e1192b8c0d8966f509cbb04
SHA256cf5bf8ddb28c6eecd04280cfddff9f7f9efb3f5b57f8d18045c77e49c93a9c88
SHA512ae0f97cdc3a131c9347b2e5a53faae36207d6f5570623462fe472248189c73f01c55c00aec7262925a51295289c3cb11dc3d71bdb4637b38418820e71b70b853
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5514ff1af03e5b29c8b527c26677b8c86
SHA1ffd1ea94b1263c31bdc2ee0c418ea3ece6db1da5
SHA256a85ea30beaa90d46aaea5f99c161e709c28439181423a9622e2b393a9e69e1b3
SHA512ac1337bf2edfa6f8a2c737e3cb83f0889c13e9c3249f8624e563e377ad71aa9b17f7fb83fa46bbdd81f168af2fdbce673fc39967285e6be3daccad5354cd3954