Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 04:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://is.gd/gLPRrT
Resource
win10v2004-20240611-en
General
-
Target
https://is.gd/gLPRrT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4704 msedge.exe 4704 msedge.exe 4332 msedge.exe 4332 msedge.exe 3144 identity_helper.exe 3144 identity_helper.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe 5716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4332 wrote to memory of 4348 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4348 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4372 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4704 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4704 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe PID 4332 wrote to memory of 4952 4332 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://is.gd/gLPRrT1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8428346f8,0x7ff842834708,0x7ff8428347182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,7176797714865933173,17608182456433476949,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,7176797714865933173,17608182456433476949,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,7176797714865933173,17608182456433476949,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7176797714865933173,17608182456433476949,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7176797714865933173,17608182456433476949,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7176797714865933173,17608182456433476949,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,7176797714865933173,17608182456433476949,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3464 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,7176797714865933173,17608182456433476949,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7176797714865933173,17608182456433476949,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7176797714865933173,17608182456433476949,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7176797714865933173,17608182456433476949,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,7176797714865933173,17608182456433476949,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,7176797714865933173,17608182456433476949,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
288B
MD57d39058d649fbf75df3f2eb608ae61c4
SHA17277bc5df0d5fb5582a23c8cb50c5bec8768f7a5
SHA25687a52f4c7da3127d461c6f8f095e08bc460c7dcb39d8437348687d18ceb40ade
SHA5126a15554bbdd5aba5ed7f2a50d888bb1b5c45aa320f30e3bc68be66165131982ea4700dd180c60638f0d43416ec5254c68040214cb645726266fe4401a1c53e3b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD5671a681c62b4874648710cb242ceab8d
SHA1b24b159ef1741425e51a364f38d815f3cc46c1c2
SHA25631f31d393d38e94f7ff8a03fd36631317151a2408b4408bf26f1b7ea05caa8b5
SHA51246170766ef5efb229cc91ab54a2df6dfa6c92c259d26386abea5627cdd40fa0509043164b5b76a03e985451d4de6d913cb377c4bad200b0bcba8f68010cec73e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD5a64bbae52d1ae1d68a9d6f6d85a59b25
SHA12b1c8883627ca5251c5941520d7c4b231ac24d24
SHA2563add3e87f2b17d4fbb392dd6dc003603f176b12db0ba3f04c0093189523c58ee
SHA51216c740e4ab38d6dfa20ad3880f79020dc69dd94d0634c5f87d7edf4c9d4ddb1f4f9422a3e9de15f4819c8fc4dbd0435eeb83def396f25316d9207a6717cf00d7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5e7627745bbe29c039f5bca8d41273e53
SHA1648fd968aa106d3591a0340eb46f2412a2c36ca5
SHA256b4d17fc3933835017e24849b71cad5e0e8b37f857cdf49870d81877776f9492d
SHA5126edc5da4cee9db182d82afcec46966806fe20d96807c31af375f75987d63f7aca208064d9ce1f9c19ecfad98a4bc6a8737dc775c1d7fc502ac076a2cebcde5ad
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD59224b50563e6dfa9c04a299e67911f08
SHA18340be747dc744eda2db06c02f2fbee3652b3c7a
SHA256ed72d7094c93c4b196d5dabea87f26ec375fe94751c97965ceb14c27016c8497
SHA512c410c0d57d222c728c85591bcb5e7a96fe3307930ce9aad46f7cd6156e7d3ad205e2402d5131446acf7082f497bd670af99d1dccdd774fec22cb90c86a25e33d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5201c0c34f4a0ef3b49a81898a6eab8d7
SHA104211f4c4d2e84d1349e05c2d29ec7b4384ace2c
SHA2562ddfcebbb3ffbf18776bd60c95fde0c7dd473b387135e44f460dbdf4e2041073
SHA5128ad99438900e8f47d31835d6d2c0ede7d0826c5175ca21f1a399147da95c80cee5ed60e2cdcdef78bb7777fcce837c557c9b81be67cfd1d58f024d932ef81ab7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5aabf5c91a0a5848d450bf4277543f5e7
SHA10f4ddb357a5f73d2105d191174eda885bcd8b891
SHA25629ac9923e0811d7516f26ff3e5e826008eacea0960e67af9820f49fd32178c38
SHA512611a38b60a57b962017409a841d0888a612301c4cc6b2c2733d2eb2dca9bf62ba4b6a85a5b292797db26d2f1e22a6c055181df92423cfe9c9cd9a10d9163efb8
-
\??\pipe\LOCAL\crashpad_4332_QTBAOYHYSBEWLBXHMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e