Analysis
-
max time kernel
64s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 02:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1QcCkpV4P9C6cCu0XG81IshTSrP-5bLwT/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1QcCkpV4P9C6cCu0XG81IshTSrP-5bLwT/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1060 msedge.exe 1060 msedge.exe 924 msedge.exe 924 msedge.exe 3664 identity_helper.exe 3664 identity_helper.exe 5576 msedge.exe 5576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 6084 7zG.exe Token: 35 6084 7zG.exe Token: SeSecurityPrivilege 6084 7zG.exe Token: SeSecurityPrivilege 6084 7zG.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 6084 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 924 wrote to memory of 2988 924 msedge.exe 84 PID 924 wrote to memory of 2988 924 msedge.exe 84 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 2200 924 msedge.exe 85 PID 924 wrote to memory of 1060 924 msedge.exe 86 PID 924 wrote to memory of 1060 924 msedge.exe 86 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87 PID 924 wrote to memory of 1668 924 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1QcCkpV4P9C6cCu0XG81IshTSrP-5bLwT/view1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc07546f8,0x7ffcc0754708,0x7ffcc07547182⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,7803530898653164185,2581919699356341192,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,7803530898653164185,2581919699356341192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,7803530898653164185,2581919699356341192,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7803530898653164185,2581919699356341192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7803530898653164185,2581919699356341192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7803530898653164185,2581919699356341192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,7803530898653164185,2581919699356341192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,7803530898653164185,2581919699356341192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7803530898653164185,2581919699356341192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7803530898653164185,2581919699356341192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7803530898653164185,2581919699356341192,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7803530898653164185,2581919699356341192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7803530898653164185,2581919699356341192,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2152,7803530898653164185,2581919699356341192,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5856 /prefetch:82⤵PID:5324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7803530898653164185,2581919699356341192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2152,7803530898653164185,2581919699356341192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6476 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5576
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3736
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5816
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Finzar Ultimate Bundle Plus Collection\" -spe -an -ai#7zMap18623:138:7zEvent283621⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:6084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD571fa5279e2873c2e3a36456cfdb9d444
SHA18f822fad198c93306cb27b07ac313f4339419f55
SHA256b6592d66abdb6848d74248975a0859fae44e98189b45c3faa37d07c107bfb994
SHA5127a25c310ded03d271c7b5bc59a6dfd509c4badd638407c7f3c8628b0eb870c8c67a8dd8b39e8033ca30a5035cffe10344a9c4ce8e7af4fe7c5a1594a3d8465aa
-
Filesize
6KB
MD5b29b1bbfea0b14871e32f7cf9d194779
SHA1cc3481981e34eac2ee2070cda8b4fc381c87763f
SHA256695314ddd99d42fbb01fa554606875887dd32598b64fe56788c693ac75f4ac11
SHA512d25538cad6cc7b3dc827b4911c775bb81b84830dbb88a5f5596c87f1132af8a35f1ea8be9db9a90ff4bb3c1511812de40777317a1a42f9fafe5b7b30ca4084a4
-
Filesize
7KB
MD5bf94c2269dba9cc6ff22d87f6f9a9dd8
SHA1c36902fc3bf56130c9b113300a1b21013a91e894
SHA2561c4080e7d2d58660664a0133491752101b2324bf30678f11b9fb69a2ac676b4b
SHA512799275e1451dfe0f9ced7dc5e46346e659ce1399ac038a4a7af4396b231dc8467bc39a1076824c0da5a0678fb803acba9d73c74bb86da35ee2d21490dd72e9c6
-
Filesize
7KB
MD57ac752a10d78b5fcc1ffe9cbee4f81d0
SHA1f3ee301a1b94119452bc8a61d0e9bc451eda5478
SHA25696753dcf54aa6f3b7a0e686cb487b585bb87a531335ac71439c6a5360d8e56a3
SHA512829a692bc0b5d09622280df5f7206b3614a97f8ff912f8afbad6697b6e2d75bfe212c1264642d5abce9436b682e8c1c465629716ffdc350d320278ddf57acc60
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51cd579315227cd62cbdfe753592d9796
SHA1c87eb023846c36624b71055ce1bae7323803b8b0
SHA25687b059a6d9398dfb43df0e098367d3ef72c6aca373ea21bf9858dc8b2651cd93
SHA512f0ec0e2eb7fd741e84183ab3946eda8c9019053f8b2680a40cb6093b1e9835cd84ff1404f077e7e99266e0e9c9e596529c5b52b627c5f7d78d5f3fe4fc089de6
-
Filesize
11KB
MD55fe68ca607356d469ba1766e0faa5137
SHA127c50d404dc71a37bf1fa09561a58c692526cb16
SHA2561b8614489b633034dae1b1b8eaf077ce9a4f4f27c8770fff56e315661eb6fb86
SHA5129c24bee68cc1cd39932107d169e9ce48dee94e2606ee6c44ecedca0d963ac5a043621b0cc9b9def526c63893f9efd2f810ea62927f971e5bb7e5b1f37349927e
-
C:\Users\Admin\Downloads\Finzar Ultimate Bundle Plus Collection\Like & Subscribe CTA\Editing Resources.txt
Filesize220B
MD53829292de719787a970268fc8c363866
SHA10ce5fb25e508342954f07ed4b8a496dd7ce9a399
SHA256980535b11929284ca263f4d6176d867c0bba76af6192c57c6cade7b1ce654a3a
SHA512cf54f62e7bf33bc000e036db1339ca016266cc0aa99d4735388830c6b5a7eb75009ac8e10b37251965163778fc6cf57c35e6f300edafe4dee8569f67ebeaf76d