Analysis
-
max time kernel
104s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 06:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1JEyJqUbETAl_TA4ESa8y69PfADZjNP6g/view?usp=sharing
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1JEyJqUbETAl_TA4ESa8y69PfADZjNP6g/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 6 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 464 msedge.exe 464 msedge.exe 2708 msedge.exe 2708 msedge.exe 2600 identity_helper.exe 2600 identity_helper.exe 5376 msedge.exe 5376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 5084 2708 msedge.exe 84 PID 2708 wrote to memory of 5084 2708 msedge.exe 84 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 1108 2708 msedge.exe 87 PID 2708 wrote to memory of 464 2708 msedge.exe 88 PID 2708 wrote to memory of 464 2708 msedge.exe 88 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89 PID 2708 wrote to memory of 3416 2708 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1JEyJqUbETAl_TA4ESa8y69PfADZjNP6g/view?usp=sharing1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82b1346f8,0x7ff82b134708,0x7ff82b1347182⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16485247372354993161,9799442596158432473,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,16485247372354993161,9799442596158432473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,16485247372354993161,9799442596158432473,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16485247372354993161,9799442596158432473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16485247372354993161,9799442596158432473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16485247372354993161,9799442596158432473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,16485247372354993161,9799442596158432473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,16485247372354993161,9799442596158432473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16485247372354993161,9799442596158432473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2076,16485247372354993161,9799442596158432473,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5816 /prefetch:82⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16485247372354993161,9799442596158432473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16485247372354993161,9799442596158432473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:5220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16485247372354993161,9799442596158432473,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,16485247372354993161,9799442596158432473,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16485247372354993161,9799442596158432473,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6528 /prefetch:12⤵PID:5516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16485247372354993161,9799442596158432473,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6520 /prefetch:12⤵PID:5524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:980
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5736
-
C:\Users\Admin\Downloads\waa\w.exe"C:\Users\Admin\Downloads\waa\w.exe"1⤵PID:1692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5a12bcb0e1df0231fa879a820f00abb7c
SHA10fa01c51be369909b9c70b8609d3dd7dd1e3a5b8
SHA256aff660efbb9c3550a51dfea0a3afb668be5884631a30430167b36891d9a83eb4
SHA5121ceb10d01822b5b4da13c6ea1fbc5260b2a6c96eb180e4e87c97d322add417412147f34571b8ba4428b7617726e3687120ce4f6f72f286824b3d83638e2f9bc3
-
Filesize
3KB
MD5babcf569b42660ee8b388d0b1cef187d
SHA10ac8f824d37379bb4e067d993ca4def38624db21
SHA256ff08fba7353438e6b39ac45dcc6e51f9726670f30cc4d8525ed97f2c8b1d74cb
SHA512c7dd81fe592cd359958ce9a06e90f24e1b9aba50da4a76f1320c1d763b60e037132d428435d9c76f6dbcf659b72fb450aa20f36bc40a3b52436bac13c4b16f7a
-
Filesize
5KB
MD54bebfd593b7fb9ab5c0de7a34a62231e
SHA13a6d06b8b1679af66db384a48533395d852d8367
SHA2569a76ae6a37dc62a4249457ea53bb7aeaa8f75731b4f94affb0c2ae37b59928d0
SHA5123c964270c23035fb2321f0fef974ac482213a398670a67c0946ae6927c82f176d013e8aed205fe9e9abb368a222356656c87a832da3a77d12c48d57aed711d36
-
Filesize
6KB
MD5e960693e106a3f679cdae6cf5c4b0bca
SHA1ba76039555f2444687cf09b23dcf889b788dc2a6
SHA2564c53d01ee6db29891c66aeb5ed85e0917439c9041da83cf39ecc946d1f743839
SHA512a69f7abf872120662ead9f7f6392a0df558acd33161ec6581b40f1d5e961422fc1dd03fb348bf00327673dedfdcb4a1a8c7f1b624092f1c2bdfec5e7dac2398b
-
Filesize
6KB
MD5825a96fc8afeedb987e9a190804562ee
SHA1b743667b9748e5f7c8abcafa3c0bc504b97995f6
SHA256b03d410979ea7b6c0eee8e23693c9df626bb3e0fa144e8979ca196860a5ea5dd
SHA5126d29c49451fe21c00b7c372dc4f9964eb947fdfede6e3651a634c2aecff469c02573783b633272f1bb6835155fe0cbf9fd7527a5dd9571d712d9e07764c3dced
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD595982a99860a9222bda30d4fd1676db0
SHA16d038ea2dccd8465501ede0185c004b24dec16cd
SHA2560be40842d500d4c8ac88041260a46df623eb831f911cde45ca0ae153d96d9327
SHA512f4d86a0e3b641b8e75a121dd2a25f1124ba6819ba0c922b3c49f650f23f1a0aa72dd819e00abe1ca8bd7249b816e962af7b97c2abefde39a94b6dd8d34d2ec03
-
Filesize
11KB
MD518a0f35a734f0e1f02b7f964cdbb5f5f
SHA104d68f3625f3a6c37fcdbfbdfa52a79a02fa164b
SHA256938c281365e57789fc91673ecb668577d970ab14cd243c7b0f2074fc433ab48a
SHA5129fce592122f4e206d646ff06ff9982b1cdd1a8f11316873adb2e6b575729ae42e713eba58c9c03b6e44a2baf5bffdd062fbab71d40d5f6a3edb188c64d56239a
-
Filesize
1.1MB
MD5924599a3fc93f5d348ba5966c38e2e0a
SHA1e5565dfc5e201c2982e25b89acf47d75fc2c8e54
SHA256acd15844bd1a5b1229908ed5f4e049f9cef83cc9b52f1549206675ba546c8b2b
SHA5126225f61f0f26a0a096c5dbb6065bd1e6c579059bdb2cc06cb9499d0c329ace3fb56cc6cc6ed85d7cb4ebdf4415724025fdaad265a8af6eb80c0dafa0eb40c91e