Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe
Resource
win10v2004-20221111-en
General
-
Target
a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe
-
Size
1.0MB
-
MD5
8bc0e7d1a78d454caaa87d3b7caa92c3
-
SHA1
d0135e2e13f0d13aa2c49fb0d78f987f8d9ad67f
-
SHA256
a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1
-
SHA512
237016f4e9dd9b6a10359926caf886aea96595b20e87117b316019151e361895ba5ae10efd13f1c3066bc07ef4746d9ef59f857da7a6adc5966f75fbfebc4454
-
SSDEEP
24576:s4SRmIAZ6QGs1ikSHP5hs10Ot1LisENzP:s4SZO5SvOtVisEJP
Malware Config
Extracted
darkcomet
V2
spamblocker.no-ip.biz:1604
DC_MUTEX-NZ2A7W0
-
gencode
ji6MMZDpnHyq
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1476 pspluginwkr.exe 1760 winresume.exe 1340 pspluginwkr.exe -
Loads dropped DLL 3 IoCs
pid Process 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 1760 winresume.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce pspluginwkr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\System Monitor Control = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\pspluginwkr.exe" pspluginwkr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2044 set thread context of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 1760 set thread context of 1072 1760 winresume.exe 31 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1476 pspluginwkr.exe 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1760 winresume.exe 1760 winresume.exe 1760 winresume.exe 1760 winresume.exe 1760 winresume.exe 1760 winresume.exe 1760 winresume.exe 1760 winresume.exe 1760 winresume.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
description pid Process Token: SeDebugPrivilege 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe Token: SeIncreaseQuotaPrivilege 432 AppLaunch.exe Token: SeSecurityPrivilege 432 AppLaunch.exe Token: SeTakeOwnershipPrivilege 432 AppLaunch.exe Token: SeLoadDriverPrivilege 432 AppLaunch.exe Token: SeSystemProfilePrivilege 432 AppLaunch.exe Token: SeSystemtimePrivilege 432 AppLaunch.exe Token: SeProfSingleProcessPrivilege 432 AppLaunch.exe Token: SeIncBasePriorityPrivilege 432 AppLaunch.exe Token: SeCreatePagefilePrivilege 432 AppLaunch.exe Token: SeBackupPrivilege 432 AppLaunch.exe Token: SeRestorePrivilege 432 AppLaunch.exe Token: SeShutdownPrivilege 432 AppLaunch.exe Token: SeDebugPrivilege 432 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 432 AppLaunch.exe Token: SeChangeNotifyPrivilege 432 AppLaunch.exe Token: SeRemoteShutdownPrivilege 432 AppLaunch.exe Token: SeUndockPrivilege 432 AppLaunch.exe Token: SeManageVolumePrivilege 432 AppLaunch.exe Token: SeImpersonatePrivilege 432 AppLaunch.exe Token: SeCreateGlobalPrivilege 432 AppLaunch.exe Token: 33 432 AppLaunch.exe Token: 34 432 AppLaunch.exe Token: 35 432 AppLaunch.exe Token: SeDebugPrivilege 1476 pspluginwkr.exe Token: SeDebugPrivilege 1760 winresume.exe Token: SeIncreaseQuotaPrivilege 1072 AppLaunch.exe Token: SeSecurityPrivilege 1072 AppLaunch.exe Token: SeTakeOwnershipPrivilege 1072 AppLaunch.exe Token: SeLoadDriverPrivilege 1072 AppLaunch.exe Token: SeSystemProfilePrivilege 1072 AppLaunch.exe Token: SeSystemtimePrivilege 1072 AppLaunch.exe Token: SeProfSingleProcessPrivilege 1072 AppLaunch.exe Token: SeIncBasePriorityPrivilege 1072 AppLaunch.exe Token: SeCreatePagefilePrivilege 1072 AppLaunch.exe Token: SeBackupPrivilege 1072 AppLaunch.exe Token: SeRestorePrivilege 1072 AppLaunch.exe Token: SeShutdownPrivilege 1072 AppLaunch.exe Token: SeDebugPrivilege 1072 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 1072 AppLaunch.exe Token: SeChangeNotifyPrivilege 1072 AppLaunch.exe Token: SeRemoteShutdownPrivilege 1072 AppLaunch.exe Token: SeUndockPrivilege 1072 AppLaunch.exe Token: SeManageVolumePrivilege 1072 AppLaunch.exe Token: SeImpersonatePrivilege 1072 AppLaunch.exe Token: SeCreateGlobalPrivilege 1072 AppLaunch.exe Token: 33 1072 AppLaunch.exe Token: 34 1072 AppLaunch.exe Token: 35 1072 AppLaunch.exe Token: SeDebugPrivilege 1340 pspluginwkr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 432 AppLaunch.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2044 wrote to memory of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 2044 wrote to memory of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 2044 wrote to memory of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 2044 wrote to memory of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 2044 wrote to memory of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 2044 wrote to memory of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 2044 wrote to memory of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 2044 wrote to memory of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 2044 wrote to memory of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 2044 wrote to memory of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 2044 wrote to memory of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 2044 wrote to memory of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 2044 wrote to memory of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 2044 wrote to memory of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 2044 wrote to memory of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 2044 wrote to memory of 432 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 28 PID 2044 wrote to memory of 1476 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 29 PID 2044 wrote to memory of 1476 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 29 PID 2044 wrote to memory of 1476 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 29 PID 2044 wrote to memory of 1476 2044 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 29 PID 1476 wrote to memory of 1760 1476 pspluginwkr.exe 30 PID 1476 wrote to memory of 1760 1476 pspluginwkr.exe 30 PID 1476 wrote to memory of 1760 1476 pspluginwkr.exe 30 PID 1476 wrote to memory of 1760 1476 pspluginwkr.exe 30 PID 1760 wrote to memory of 1072 1760 winresume.exe 31 PID 1760 wrote to memory of 1072 1760 winresume.exe 31 PID 1760 wrote to memory of 1072 1760 winresume.exe 31 PID 1760 wrote to memory of 1072 1760 winresume.exe 31 PID 1760 wrote to memory of 1072 1760 winresume.exe 31 PID 1760 wrote to memory of 1072 1760 winresume.exe 31 PID 1760 wrote to memory of 1072 1760 winresume.exe 31 PID 1760 wrote to memory of 1072 1760 winresume.exe 31 PID 1760 wrote to memory of 1072 1760 winresume.exe 31 PID 1760 wrote to memory of 1072 1760 winresume.exe 31 PID 1760 wrote to memory of 1072 1760 winresume.exe 31 PID 1760 wrote to memory of 1072 1760 winresume.exe 31 PID 1760 wrote to memory of 1072 1760 winresume.exe 31 PID 1760 wrote to memory of 1072 1760 winresume.exe 31 PID 1760 wrote to memory of 1072 1760 winresume.exe 31 PID 1760 wrote to memory of 1072 1760 winresume.exe 31 PID 1760 wrote to memory of 1340 1760 winresume.exe 32 PID 1760 wrote to memory of 1340 1760 winresume.exe 32 PID 1760 wrote to memory of 1340 1760 winresume.exe 32 PID 1760 wrote to memory of 1340 1760 winresume.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe"C:\Users\Admin\AppData\Local\Temp\a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:432
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\pspluginwkr.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\pspluginwkr.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\winresume.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\winresume.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\pspluginwkr.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\pspluginwkr.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD599e0106f89c12144cd3c82216382e110
SHA144e1640b98b27aca3530d41a7b853c73172623fc
SHA2564bef292be3b4fc87d7300408032886248e6bcfa002d3c5e48b7e47d6fedc78c5
SHA5123b6d8f7679896ab1e69ae94025162116397c8adcf46a95c30dd54b2f8f95e0fc6adc9f068e5ecd4ed070084c646e12368588511756374c62c7525bf3b91e10ab
-
Filesize
15KB
MD599e0106f89c12144cd3c82216382e110
SHA144e1640b98b27aca3530d41a7b853c73172623fc
SHA2564bef292be3b4fc87d7300408032886248e6bcfa002d3c5e48b7e47d6fedc78c5
SHA5123b6d8f7679896ab1e69ae94025162116397c8adcf46a95c30dd54b2f8f95e0fc6adc9f068e5ecd4ed070084c646e12368588511756374c62c7525bf3b91e10ab
-
Filesize
15KB
MD599e0106f89c12144cd3c82216382e110
SHA144e1640b98b27aca3530d41a7b853c73172623fc
SHA2564bef292be3b4fc87d7300408032886248e6bcfa002d3c5e48b7e47d6fedc78c5
SHA5123b6d8f7679896ab1e69ae94025162116397c8adcf46a95c30dd54b2f8f95e0fc6adc9f068e5ecd4ed070084c646e12368588511756374c62c7525bf3b91e10ab
-
Filesize
15KB
MD599e0106f89c12144cd3c82216382e110
SHA144e1640b98b27aca3530d41a7b853c73172623fc
SHA2564bef292be3b4fc87d7300408032886248e6bcfa002d3c5e48b7e47d6fedc78c5
SHA5123b6d8f7679896ab1e69ae94025162116397c8adcf46a95c30dd54b2f8f95e0fc6adc9f068e5ecd4ed070084c646e12368588511756374c62c7525bf3b91e10ab
-
Filesize
1.0MB
MD58bc0e7d1a78d454caaa87d3b7caa92c3
SHA1d0135e2e13f0d13aa2c49fb0d78f987f8d9ad67f
SHA256a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1
SHA512237016f4e9dd9b6a10359926caf886aea96595b20e87117b316019151e361895ba5ae10efd13f1c3066bc07ef4746d9ef59f857da7a6adc5966f75fbfebc4454
-
Filesize
1.0MB
MD58bc0e7d1a78d454caaa87d3b7caa92c3
SHA1d0135e2e13f0d13aa2c49fb0d78f987f8d9ad67f
SHA256a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1
SHA512237016f4e9dd9b6a10359926caf886aea96595b20e87117b316019151e361895ba5ae10efd13f1c3066bc07ef4746d9ef59f857da7a6adc5966f75fbfebc4454
-
Filesize
514B
MD56f1c3c0810784a0f8fa27ba8b591aec0
SHA16cc59cd62dc0cdd6ef2637acbca2b1b50939b469
SHA256dd0f90728819e68e329127be04e110b836bfacec645a9d9d1853cea144b152fd
SHA5124c9300fcb171952c21fcaef61b76e9ea3433cca3c71f546f3c603167205beba781ce75cb30742d368b1320dd0d9b91ec248d929be9ea9d0da7f2401ae1bc6b05
-
Filesize
15KB
MD599e0106f89c12144cd3c82216382e110
SHA144e1640b98b27aca3530d41a7b853c73172623fc
SHA2564bef292be3b4fc87d7300408032886248e6bcfa002d3c5e48b7e47d6fedc78c5
SHA5123b6d8f7679896ab1e69ae94025162116397c8adcf46a95c30dd54b2f8f95e0fc6adc9f068e5ecd4ed070084c646e12368588511756374c62c7525bf3b91e10ab
-
Filesize
15KB
MD599e0106f89c12144cd3c82216382e110
SHA144e1640b98b27aca3530d41a7b853c73172623fc
SHA2564bef292be3b4fc87d7300408032886248e6bcfa002d3c5e48b7e47d6fedc78c5
SHA5123b6d8f7679896ab1e69ae94025162116397c8adcf46a95c30dd54b2f8f95e0fc6adc9f068e5ecd4ed070084c646e12368588511756374c62c7525bf3b91e10ab
-
Filesize
1.0MB
MD58bc0e7d1a78d454caaa87d3b7caa92c3
SHA1d0135e2e13f0d13aa2c49fb0d78f987f8d9ad67f
SHA256a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1
SHA512237016f4e9dd9b6a10359926caf886aea96595b20e87117b316019151e361895ba5ae10efd13f1c3066bc07ef4746d9ef59f857da7a6adc5966f75fbfebc4454