Overview
overview
7Static
static
3Dimension_Souls.rar
windows7-x64
7Dimension_Souls.rar
windows10-2004-x64
7Dimension ...up.exe
windows7-x64
7Dimension ...up.exe
windows10-2004-x64
7$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1locales/uk.ps1
windows7-x64
1locales/uk.ps1
windows10-2004-x64
1resources/elevate.exe
windows7-x64
1resources/elevate.exe
windows10-2004-x64
1rush.exe
windows7-x64
1rush.exe
windows10-2004-x64
7vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 14:20
Static task
static1
Behavioral task
behavioral1
Sample
Dimension_Souls.rar
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Dimension_Souls.rar
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Dimension Souls Setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Dimension Souls Setup.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
LICENSES.chromium.html
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
LICENSES.chromium.html
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral12
Sample
ffmpeg.dll
Resource
win7-20240220-en
Behavioral task
behavioral13
Sample
ffmpeg.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral14
Sample
libEGL.dll
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
libEGL.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral16
Sample
libGLESv2.dll
Resource
win7-20240220-en
Behavioral task
behavioral17
Sample
libGLESv2.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral18
Sample
locales/uk.ps1
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
locales/uk.ps1
Resource
win10v2004-20240221-en
Behavioral task
behavioral20
Sample
resources/elevate.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
resources/elevate.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral22
Sample
rush.exe
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
rush.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral24
Sample
vk_swiftshader.dll
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
vk_swiftshader.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral26
Sample
vulkan-1.dll
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
vulkan-1.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240221-en
General
-
Target
LICENSES.chromium.html
-
Size
6.5MB
-
MD5
180f8acc70405077badc751453d13625
-
SHA1
35dc54acad60a98aeec47c7ade3e6a8c81f06883
-
SHA256
0bfa9a636e722107b6192ff35c365d963a54e1de8a09c8157680e8d0fbbfba1c
-
SHA512
40d3358b35eb0445127c70deb0cb87ec1313eca285307cda168605a4fd3d558b4be9eb24a59568eca9ee1f761e578c39b2def63ad48e40d31958db82f128e0ec
-
SSDEEP
24576:d7rs5kjWSnB3lWNeUmf0f6W6M6q6A6r/HXpErpem:rovj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3860 msedge.exe 3860 msedge.exe 2624 msedge.exe 2624 msedge.exe 4588 identity_helper.exe 4588 identity_helper.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2624 wrote to memory of 4056 2624 msedge.exe 74 PID 2624 wrote to memory of 4056 2624 msedge.exe 74 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 1800 2624 msedge.exe 89 PID 2624 wrote to memory of 3860 2624 msedge.exe 88 PID 2624 wrote to memory of 3860 2624 msedge.exe 88 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90 PID 2624 wrote to memory of 4992 2624 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd652646f8,0x7ffd65264708,0x7ffd652647182⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,6204772084746659025,5696417167641888133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6204772084746659025,5696417167641888133,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,6204772084746659025,5696417167641888133,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6204772084746659025,5696417167641888133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6204772084746659025,5696417167641888133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,6204772084746659025,5696417167641888133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,6204772084746659025,5696417167641888133,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6204772084746659025,5696417167641888133,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6204772084746659025,5696417167641888133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6204772084746659025,5696417167641888133,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6204772084746659025,5696417167641888133,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6204772084746659025,5696417167641888133,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD558670ac03d80eb4bd1cec7ac5672d2e8
SHA1276295d2f9e58fb0b8ef03bd9567227fb94e03f7
SHA25676e1645d9c4f363b34e554822cfe0d53ff1fce5e994acdf1edeff13ae8df30f8
SHA51299fe23263de36ec0c8b6b3b0205df264250392cc9c0dd8fa28cf954ff39f9541f722f96a84fbc0b4e42cfd042f064525a6be4b220c0180109f8b1d51bbdef8ff
-
Filesize
152B
MD53782686f747f4a85739b170a3898b645
SHA181ae1c4fd3d1fddb50b3773e66439367788c219c
SHA25667ee813be3c6598a8ea02cd5bb5453fc0aa114606e3fc7ad216f205fe46dfc13
SHA51254eb860107637a611150ff18ac57856257bf650f70dce822de234aee644423080b570632208d38e45e2f0d2bf60ca2684d3c3480f9637ea4ad81f2bcfb9f24d5
-
Filesize
6KB
MD5aa798da147a1f1dbb9a243d64247eb1e
SHA14fd42bdd0a75b572a89d6f5287fc9361dbd30ee3
SHA256ca9880a58ba42998486f708da1f1844895eae3c80e06fc344442fb42ce54ff84
SHA512e80c8714c1446a2ae99538415518ed50716b13d5a0eba4472817959df109b1b9932c8f6cff2445cfba152c7e8a4d7af3242d348fdf2d0c10acd6163cb263e31c
-
Filesize
6KB
MD5d1d4e007cb2e634475cc63cb611aa85f
SHA1b221b5172c62e4718caad0df7407557a04020695
SHA2568f1bfa6ab7b7e8cc514c8c9dfe526455f4e44b88d5c323c04018c79eb9231517
SHA5120848101ae984c474e3eade430b7a3824ce3b3623efde71afb0a4962242d756c0b7bd76a993b0ef9853983cc4547182c9db2feddfcb1134cb1bcb6414d6b05337
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b9bf13ea2edf1dc72d1c0ec43959987d
SHA1f1b79d7ca6410764fb78f7ab4b12238e5d229d8e
SHA256ee4ea5bcb0e6998cf18f5d658fb3e7391ba465bb5395eaba919166a248a8b761
SHA512fdc84ed6b2ca3bb9d2b147b2a58d6227a78f4f56a707321eea844895c0a2b8db6fefa9a27d259e6f56716f2d71227cd93fa2f1ae18990022c867bd9ce12597ec