Analysis
-
max time kernel
242s -
max time network
260s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 13:54
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: B46927F363E9FD120A495F99@AdobeOrg
-
A potential corporate email address has been identified in the URL: B46927F363E9FD120A495F99@AdobeOrg617172304604150328611429284079274388469
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2540 msedge.exe 2540 msedge.exe 216 identity_helper.exe 216 identity_helper.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1820 2540 msedge.exe 82 PID 2540 wrote to memory of 1820 2540 msedge.exe 82 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 4508 2540 msedge.exe 83 PID 2540 wrote to memory of 2800 2540 msedge.exe 84 PID 2540 wrote to memory of 2800 2540 msedge.exe 84 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85 PID 2540 wrote to memory of 3524 2540 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.onsemi.com/company/about-onsemi1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3d6846f8,0x7ffc3d684708,0x7ffc3d6847182⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16729241983741967175,8603349249010534103,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,16729241983741967175,8603349249010534103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,16729241983741967175,8603349249010534103,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2596 /prefetch:82⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16729241983741967175,8603349249010534103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16729241983741967175,8603349249010534103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16729241983741967175,8603349249010534103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16729241983741967175,8603349249010534103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16729241983741967175,8603349249010534103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16729241983741967175,8603349249010534103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 /prefetch:82⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,16729241983741967175,8603349249010534103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16729241983741967175,8603349249010534103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16729241983741967175,8603349249010534103,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16729241983741967175,8603349249010534103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,16729241983741967175,8603349249010534103,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16729241983741967175,8603349249010534103,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize744B
MD555f7ffcc43fe804e9f60f422f3d860e8
SHA1d9785a59130a4a31c1cdcd7cba2e0f637de5cb60
SHA256b03ccfcd28e3d9b626bc2eee441fc24e5cff81b38bb60946b34a0282ebfe48cc
SHA5125c2e3e9ad283cf25150cfd8b7eeac48eda95e1c19cba07abf63195f37d9e182a53655fd4f1b79ef99edb9f2d342947195742524d859ce01c90eacbd7c5d80998
-
Filesize
3KB
MD51a88ce7e2bfd97dd9de9858ab82aed95
SHA10ace340488bedf4f829ade4bcd45fab8094b1c68
SHA25618c351356ac88f117e99ad9c418f29d9d48bd14818b99e8fca8b9ee48ccc94d2
SHA51236c778da2c95a8ec9ce8264417a4cbd7bac39449053b7a17e0e5649b8a216eed08e40576867fd4b96ee8667921401e2817bb7bc22eb83b7d8c11437d832c0f54
-
Filesize
5KB
MD52f87184405ead1a275d557ce34284c6c
SHA11bdfc72e6eee0a9d7b543579b1b4fca13ac37f39
SHA256f65f2d184ef9fa9d4c895885224f2844db98486ade67e72bde0b3c8d14731807
SHA5120e84716db85c2d6fc4f3d9a2b2be5e71a66d990c7f1c8e97abaf5bec2a6860ecc2114c970deee32a7d43628872ee81bb741344d431e8db806b0f47938c2161ca
-
Filesize
7KB
MD50e59bda362d71549052cd3b248f612ee
SHA1d26ecaac2e0c63cf4a0e25bd8aaad0f114820cbf
SHA2563a56eff8cf384435ee46cfd2cc772de72f23e42315994844b797820ecd3aff5e
SHA5123abaad5fd6508b02670b9c4af51c79852b4912f392384ad0c6d2801c0f4813ea8fde7cba2157282e677bb9b338af9e3aba8d99db93f5b1ace0961799b9c87557
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD56d0bc3087e99e0eef1134b7b172ddaba
SHA12fabe8469b7879f35e9640498fa8f06c5d6d81b9
SHA256b8a0065de939f691ab19859d6ed51438655453d340071f1fda229c7973c82b05
SHA5123fe60853c8f234d7859b7277a27b76fe4c126b1114f4f2504cffa45a4892c69683e91d765d9176529237d6d88f2af788359510bde0fe5604973ac72cbbf0a8e0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe582100.TMP
Filesize48B
MD5b20856fa30effb2f3b2126976cf83913
SHA1b765709ee5808a478ed7125a11f344b4f086b487
SHA2561ebff53ca25b15650b3e36507a2440d80560881a4e189ddaa8055fb9282ac936
SHA5121995ea7e4bbb2f80395f2c99f5382893e12088fbd84560a1465d9f0dc18459b9f587cb43a1d6adda3407fb704309359cf00212647e5e5eb6fd42754bfab6f687
-
Filesize
1KB
MD59b83fcbbc5f1dc0321a7319a220f6072
SHA162a14a832ce938c869a460ce5fd8c2b3183b733d
SHA25680f6a4e6b9191081cf596468b8effe5dd5408e07df3ed3c6de26644f5de2a56f
SHA512cff8a8cf1dee6be84f1084d43d2670ec67f746eba6a85c888081226e1b2ef34adc5ade7d7b35a034ca24dd44b82f24d21b2709169201b91eb811b8262a2f1fbe
-
Filesize
1KB
MD5dcddede23f20aa6743129e6a5da8664d
SHA17320412410296bb3209a0b1656830bc0da025bbc
SHA2567820b3158e1544535edee40e4ba5676b937f3e087babddae327316130253e5da
SHA512f38d1523d86e7bb7b018f9149d17410e61c743ccda723e3a5f543bdf275195fa953ff9c4f31947e28100e58f7531e5ccca6a3ba2d84c0e9970b841bb9e9f47c6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bd9b5cdcd5df0f074854ef7f5dbe6205
SHA18ce2fa027a9bcd1e8dc346f6d10667cf54d0604d
SHA256a793dbe0eaa15743dfd47e58506944a27bdcbe346b0140c6f3cb2c2999b4da59
SHA5128c885d0163a5be175d1bbabecad387e4b99c3e2d4142d2e862bcc7d1e69778bd4aad12ed9dbfca6e0b95d39f49f7cea59e5d53583d42de8d1a48b4769347dbbd