Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 23:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1267560584639942798/1270890034953850944/iwl220_1.pdf?ex=66b55814&is=66b40694&hm=021d47ab36f04751e2ea450fcc8d0221332317a614d905cab356dd4dca813402&
Resource
win10v2004-20240802-en
General
-
Target
https://cdn.discordapp.com/attachments/1267560584639942798/1270890034953850944/iwl220_1.pdf?ex=66b55814&is=66b40694&hm=021d47ab36f04751e2ea450fcc8d0221332317a614d905cab356dd4dca813402&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 912 msedge.exe 912 msedge.exe 1824 msedge.exe 1824 msedge.exe 1492 identity_helper.exe 1492 identity_helper.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1824 wrote to memory of 5052 1824 msedge.exe 83 PID 1824 wrote to memory of 5052 1824 msedge.exe 83 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 2692 1824 msedge.exe 84 PID 1824 wrote to memory of 912 1824 msedge.exe 85 PID 1824 wrote to memory of 912 1824 msedge.exe 85 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86 PID 1824 wrote to memory of 2896 1824 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1267560584639942798/1270890034953850944/iwl220_1.pdf?ex=66b55814&is=66b40694&hm=021d47ab36f04751e2ea450fcc8d0221332317a614d905cab356dd4dca813402&1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6a4646f8,0x7ffc6a464708,0x7ffc6a4647182⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2124,14485089400978501187,6702167066012673504,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=6536 /prefetch:62⤵PID:228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1204
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
256B
MD55c3eb131e25d5c24fe6a5574ce36463c
SHA1ab9bcad034ebf1357d309865947585d9442027e4
SHA2567d625ddb932016d5d016641a2c70e26042477840ea13a793fe52c890416f1417
SHA5125eee06fcb159f28e6dc3f423a1177158dad6c411231aa011c84a36c82cf8537f78793463728d82df8fb5d26ef96d2b04dfcf2f226f3cb4963061a7e40df136f2
-
Filesize
6KB
MD5a54c76aae677327bcbc1b1226838e276
SHA1bc67d31beaaf38a433fa4f20448b3279d3ddd876
SHA25697e97d0964eb9c1bdcc8e14daafca282427fdf50ea68a224bfd404755872b2e3
SHA51242db6375fc1be21ef5f636b2c0c673574c2ceeb397b7f4e67e3e47ec24c4e09f61fb3047b4692d2d98d215fc953f3078f8b840ecd6af615e9952221065ee3d47
-
Filesize
6KB
MD5277d1193dde480ce069562a4b1c67299
SHA1a165dcef78ac8bce1276895a2677affc22bfa968
SHA2562231a54971a1b7e0e9d6281b6e9fdf72071e519f816cb4ed8170eb5c2d9660cf
SHA5121ab59695ef368bc5cff6ba7655e071331392772efa42614cab5e032d13b6c9ac03f575bf6f2cefb01f0f1c1a418b91d0e6399bb9558857b21e69abc9f2f0f94d
-
Filesize
6KB
MD5efda279dafe84411b175eb69c0b8fe84
SHA1a69eff74558f57efea019fb19f69bf4d3f34efd5
SHA256c476788e1205c5ab5ee0c342ea341d1c0350c63726dbab8b7f99d55e4b69247c
SHA512f184b9c374f1a463b0f1319524f7d880ccd515d86cb8669be6cae66323dddcd0910647f320963868fcfd0ab2250dda7c0f25ece708accf654b7734b5eccbddd6
-
Filesize
6KB
MD59ed2696c578388aea0682ca0eae71075
SHA1b091a87a432e889e11d1ff4ead04c6ae4bdd3677
SHA256dc747473fec689d92b24b4d78f38579f374ecec78dd3a5e350940eb238db2be6
SHA5120b181cf2f02471402609bf0303459a262838fd3947e4bbc26509f80619b7f461f8a8937b8642b4c3df972a799a0b2a0ea172e476a082a00af0a20962a223a7fb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD598d9c7c346ac9c79663e24ddd2a61ea5
SHA1cb3c1afd9a2c003f0ab4efd5d03267b08b92943f
SHA256726154ab4b1f621a1493f844a1e3d53dae6d4bb941408df7400da8b57644a652
SHA51256d2f3050ade2a8bfbcd1d2184148833c1d337f83ea0a740774d4b767a6c963343340e37b6ad54c2d99d94f3eb184d4f27d8f2f166a27a497e8cdeceaf990642
-
Filesize
11KB
MD539db5781662bfdc7269d295306c97212
SHA1e0705da475d0fa1855fb51bb33994fb5a409c42e
SHA2568e16b6ecdfaa7003093877abad37a1bb0240ed5c2c0b8305635c603005dcc890
SHA51246e862afad0a2284dfa0ec594aa1d6e61eb088fb730889b2b2f3ac5c9b1ea1e6b6260ba6016e60aea129233cda2ee8e638f445cba8aed0c6107c62dbb9f806b9
-
Filesize
1.2MB
MD52089f93fcbc9752b8c2d8a01474b7ac7
SHA1da7a7f9c9913e41ee205cf586aded9637f8b62ad
SHA256fa77aef763c87e47e8b53a02d3e04db1f62dea6a8e472fbdb4217ac77a2868d3
SHA512ffbc4bcaf20ee88ab8ac21a956c91b36ffeb481d018bc501be8266a65b4ff09f047d322415a9f633a323576b6eab0df204f6ad86bf7751ebc1ed65850ba738ce