Analysis
-
max time kernel
62s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 09:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://rb.gy/t5insj
Resource
win10v2004-20240611-en
General
-
Target
https://rb.gy/t5insj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exepid process 4392 msedge.exe 4392 msedge.exe 4400 msedge.exe 4400 msedge.exe 472 identity_helper.exe 472 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4400 wrote to memory of 3116 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 3116 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4616 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4392 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4392 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe PID 4400 wrote to memory of 4680 4400 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://rb.gy/t5insj1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffdabb846f8,0x7ffdabb84708,0x7ffdabb847182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2909678313562989057,3023939536116898398,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,2909678313562989057,3023939536116898398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,2909678313562989057,3023939536116898398,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2909678313562989057,3023939536116898398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2909678313562989057,3023939536116898398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2909678313562989057,3023939536116898398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2909678313562989057,3023939536116898398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2909678313562989057,3023939536116898398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2909678313562989057,3023939536116898398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3660 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2909678313562989057,3023939536116898398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2909678313562989057,3023939536116898398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2909678313562989057,3023939536116898398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
3KB
MD5ddd56d8073299b129b23ebe9524bb73f
SHA13be4fb38f51b27d309851902c181a526eee0c44e
SHA256caa1633b5272f3f6e69ca3d6707081b5ea900d18256b7dd51479be3348424568
SHA512a51ea7437a8303fdfb88015a1a39724c7ce00e1165fccc1b8bda2276ea955892821b2b4abd89bc1fbdc2ef9d67ee9840eda99cd0f4de9fc05a0bd8d0388a941a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5bbd5f1fec790ad13b1eae88f0b58720b
SHA1a713b82bbc920fe1967efb460f5338c797880266
SHA256510e9fd67d134c153ab3e0f3910bea85b06821e0fa1720b9eb5a2be2cdb1eabd
SHA512f8b92d1a7c0afbe250f5bc60bbddcdce07802ce3e3303feaa2ef31526c4d544de38195bacf16cfd48c94b95e0ec338ea0536b2c62c1930254f3f7b07183176a4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5f1c91bcfb58b53e932ed12e2dc588118
SHA1e65c3dc84eed490ab1b1702ed4d453df59a97487
SHA256660d396e6fa61da93db33fa53d661a86066621443b00de661be7581eb7f48588
SHA5124b010133c213677fdc07d87684880bcb4225ff94524ca2193f62e4936a0f12e5e01bbd8fb2454408f09ac5ae84d6e862f3cbd4f5e6d5b210acebb4acbece9dfc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD56f79b9d55e9b29cf09acffa15d3e6b98
SHA1343c59ef9b6abf6803e7062c24c1a9e2eaaf3cca
SHA256a0695b49a300b4309e6d094d6aeb27d6d9f486ffc99cf2b4392d49e8c47c46f6
SHA512f2b181f588046bf0556054114d4fac99e8ac76549eed8434f82bf68b52b9aba8fc7683eb7f197e750b909bb343c087ce28d946425c45e43a4c04fd1d3c8b4165
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5aa419c95234f2d4c87c7a1ccd21584d0
SHA1c448a6cfed63334cb95f554e16e2f58cd4cdbfbc
SHA25639a1441cbc64cb4efc5b7e058c0392ad1083788db7938da597b74819671a4b5e
SHA512feac08c6bfb7b5fa51fd3584b2f0cf6fbff1ea5591553caf401dc349325eee529ecdaf6033c2ccb016ee3b0a6f518dc9dcafe7e909c0906c9081ff87d13a593d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD59f9969f5eb4b94a3ba46d9c89a41dce8
SHA17d538ff101338fc1465d4be24b24bd4a51f0c2ab
SHA2564ec1939145688a99402772305cd6cce2f6d1008b64514b8c3f62a01434a2dc70
SHA512fbf578b84706de2c860eef757b86ae2d26a0c095c1133c1baba4cc985bd2452bf9a57c119e0ceabfeb24229034af0060d5e22bd7e20eb73e93fece7c3ec55d30
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5a3f5d3aaf4ffcedc470f696e54791138
SHA153f1b1c72920cbcb026cdc0eea5a28e9f1b827b7
SHA256b145283437869824cdc527fa7526ab6b9de5ec801f065472ff0b23340c3b1e29
SHA5121e62cf746382a4522aae7ab6b2f721af8a3d893bf0914a17d36da7d7c9bfa6f4525e6689e98b7d0b9a37bcce73fe3c8d39ffe378980a6c3f1848068e3ba11d70
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe579971.TMPFilesize
1KB
MD54f230c42702b36e26df66f729ff64bd9
SHA1305ef117cf8323983a6ae1aa2a69e41597800cb7
SHA2567c2d754b8de63f3014707723ac7d770815e7a47feae39cc5c5ede8af0bc55f39
SHA5122135d182388df1145f3c32a7f480300708d5ee518e86247dd1bb404d89d95742ea0eb15ddbd1c1473897e82bae0c6aa44db662d6de6dbdddd3fc3b9528b9d905
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5724cef9b3fc0c412fca95042bd856371
SHA1fcdbe5dae80399c8ac0e3d8b1e54776bbef9621a
SHA256b9d3e2c5c0513c992da97a93e034bd3bd34c57a717628da6db77384f86a0311d
SHA512791b5313768ccccd6f7bc229a593e436c304217b4f276c6953ea69245b6b457fb6a87ab7a7b1cf96d2b8527371d8a6506a43b5c40d5486ad2641b6320dfa2444
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dicFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
\??\pipe\LOCAL\crashpad_4400_RZUCDXAREZBJFPMKMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e