Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 06:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://myeftsecure.info/taxrefund
Resource
win10v2004-20231020-en
General
-
Target
https://myeftsecure.info/taxrefund
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 2620 msedge.exe 2620 msedge.exe 2348 identity_helper.exe 2348 identity_helper.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2344 2620 msedge.exe 79 PID 2620 wrote to memory of 2344 2620 msedge.exe 79 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 2376 2620 msedge.exe 86 PID 2620 wrote to memory of 3916 2620 msedge.exe 87 PID 2620 wrote to memory of 3916 2620 msedge.exe 87 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88 PID 2620 wrote to memory of 3992 2620 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://myeftsecure.info/taxrefund1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe02e946f8,0x7ffe02e94708,0x7ffe02e947182⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14439046132599567813,5390147767547166322,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,14439046132599567813,5390147767547166322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,14439046132599567813,5390147767547166322,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14439046132599567813,5390147767547166322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14439046132599567813,5390147767547166322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14439046132599567813,5390147767547166322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14439046132599567813,5390147767547166322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14439046132599567813,5390147767547166322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,14439046132599567813,5390147767547166322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 /prefetch:82⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,14439046132599567813,5390147767547166322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14439046132599567813,5390147767547166322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14439046132599567813,5390147767547166322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14439046132599567813,5390147767547166322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14439046132599567813,5390147767547166322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14439046132599567813,5390147767547166322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14439046132599567813,5390147767547166322,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50629525c94f6548880f5f3a67846755e
SHA140ef667fc04bb1c0ae4bf2c17ded88594f0f4423
SHA256812576f4a24f399abbd54b83ba7f404f021d4a7d2ec0fd2f988ebf4cbf8477ee
SHA512f74d2e4a65a152f46852eb78dd70a958fdfb8c14e060ca41ffa783b7362e44659cc5fc73f59f3edb1f1d817000b85de7c1860512aa65d937eb5a0a8d9e5890fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD590b22886064cdfe599f29699c6803b55
SHA1663e30e2f52f1fcf9f7f255c74420c3936b5674d
SHA256c253c9dba951f652ee70d731231a9e4b02e2d1e21de2612914b720b8b4b5040b
SHA51221a1cc76a4f41de5bf647cb812d5999d96682a39ca5ed4ba99c2357127429f7a1d1f9425d9bba1835e3700072edc632c183a268344b33924c7be2ec10cd48212
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5bdcf86de518228ef61126011e5811c69
SHA10c055ce43f01a55f7b8e6c7776d35681ef0ce2ea
SHA256f7ab64ed58af0a40a0e29df28bf6189cf7a4f30afba542d82b83c4487883ad6e
SHA51259f86c9783f7f01deb5af604f7829d42782f66c1b3374746f5580927ca5b39549199c3f48e6710459a3757e100ac23d12a1fac10614967e351da2e08b7a4d06a
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
951B
MD5648b0e9e4cbe9663fb617f110b09e810
SHA166b30e58417be5d4af1ec4ca0a6aeb20d99dc7bc
SHA256c4b1b26fdb05a53f456af9cab88748243f22ab12f198c55287b70a56130ef16d
SHA51211e79f4cd6a5f573579c919a3c4a06cb2409c5f0f81f2f13c2787533529afeaf2f0c5b896dd56b5d6c7910fbdaa31c4c0639dcf6e6fbcceac1fa9606e37c0153
-
Filesize
5KB
MD541dd522e834c1ffa0d4735cec61f91df
SHA1e976ba20e702e5faade1dc967f044ccbb7936a25
SHA2569f24549c3996fd3f1127cceeac485cbd6467bdaca189542744149906fc58daa7
SHA51230a2dd283c2f624568f65ba3a9a400594788464c4b2d1bad01bd176d930bf9e52128bbd5c82c929c24202785f665cc2db188a6069c6c2816034ab2394db230d1
-
Filesize
5KB
MD59097fbfb5aa5a5e3a473be073c09f942
SHA18b52ea10b23138590fe61eca8dd3cfabf5332898
SHA25684cbe6ce7903a5f3ac3be3c6e94e0b83a743fa85176d8ad324414adf0b28b905
SHA51276b0fc2a020ef8dcc7ca927e101cb7ece68bba19810315375e53791dbde43926b419f081f9797efd277914ca3e0fddbe5af56864d2dd1cf6ef8c72a31a12cea1
-
Filesize
5KB
MD52b4aaebe8e82d5ea1ffdb7557404bc02
SHA19bacd66d68cf109a0a35ed1eb5825c56f6c1ac74
SHA256d2344ee1b2a30a83182c034d92bc93406d23709334ff5652679e7d65f05a338f
SHA512cc92a618bdbdb9a04b36f64a86db6bf8c1741a127d8a2ff281da657553a23b695f87ca4cf4e054c61d92a6ba6c714eac0eafde5f3ad1e0eaa68da836f21a9d4f
-
Filesize
24KB
MD5fd20981c7184673929dfcab50885629b
SHA114c2437aad662b119689008273844bac535f946c
SHA25628b7a1e7b492fff3e5268a6cd480721f211ceb6f2f999f3698b3b8cbd304bb22
SHA512b99520bbca4d2b39f8bedb59944ad97714a3c9b8a87393719f1cbc40ed63c5834979f49346d31072c4d354c612ab4db9bf7f16e7c15d6802c9ea507d8c46af75
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD576a99950329779f5d35682f5eb4605c6
SHA119903bf776365302212278b493f6dc64c4668551
SHA2566638a60f26b91df6ddbcf53d3b3847bf4d02ec5b6083958eb35b9e25a6de0442
SHA51230fa72fe66b2541dd7c4653cc4b9d17e7b990f594e223a3ab2a84b918365b1bfe74946248c48bcee9f0659f5947ab64b7f376021efcfbeab22a161a7eda0bd9e