Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10MonoExploits.rar
windows7-x64
3MonoExploits.rar
windows10-2004-x64
3Mono/CeleryIn.dll
windows7-x64
1Mono/CeleryIn.dll
windows10-2004-x64
1Mono/CeleryInject.exe
windows7-x64
1Mono/CeleryInject.exe
windows10-2004-x64
1Mono/Guna.UI2.dll
windows7-x64
1Mono/Guna.UI2.dll
windows10-2004-x64
1Mono/Monac...o.html
windows7-x64
1Mono/Monac...o.html
windows10-2004-x64
1Mono/Monaco/base.txt
windows7-x64
1Mono/Monaco/base.txt
windows10-2004-x64
1Mono/Monac...nc.txt
windows7-x64
1Mono/Monac...nc.txt
windows10-2004-x64
1Mono/Monac...lf.txt
windows7-x64
1Mono/Monac...lf.txt
windows10-2004-x64
1Mono/Monac...ns.txt
windows7-x64
1Mono/Monac...ns.txt
windows10-2004-x64
1Mono/Monac...lv.txt
windows7-x64
1Mono/Monac...lv.txt
windows10-2004-x64
1Mono/Monac...ain.js
windows7-x64
3Mono/Monac...ain.js
windows10-2004-x64
3Mono/Monac...bat.js
windows7-x64
3Mono/Monac...bat.js
windows10-2004-x64
3Mono/Monac...fee.js
windows7-x64
3Mono/Monac...fee.js
windows10-2004-x64
3Mono/Monac...cpp.js
windows7-x64
3Mono/Monac...cpp.js
windows10-2004-x64
3Mono/Monac...arp.js
windows7-x64
3Mono/Monac...arp.js
windows10-2004-x64
3Mono/Monac...csp.js
windows7-x64
3Mono/Monac...csp.js
windows10-2004-x64
3Analysis
-
max time kernel
42s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 15:05
Behavioral task
behavioral1
Sample
MonoExploits.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
MonoExploits.rar
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Mono/CeleryIn.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Mono/CeleryIn.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Mono/CeleryInject.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Mono/CeleryInject.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Mono/Guna.UI2.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Mono/Guna.UI2.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Mono/Monaco/Monaco.html
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Mono/Monaco/Monaco.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Mono/Monaco/base.txt
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Mono/Monaco/base.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Mono/Monaco/classfunc.txt
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
Mono/Monaco/classfunc.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Mono/Monaco/globalf.txt
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
Mono/Monaco/globalf.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
Mono/Monaco/globalns.txt
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Mono/Monaco/globalns.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Mono/Monaco/globalv.txt
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
Mono/Monaco/globalv.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
Mono/Monaco/vs/base/worker/workerMain.js
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
Mono/Monaco/vs/base/worker/workerMain.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
Mono/Monaco/vs/basic-languages/bat/bat.js
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
Mono/Monaco/vs/basic-languages/bat/bat.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
Mono/Monaco/vs/basic-languages/coffee/coffee.js
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
Mono/Monaco/vs/basic-languages/coffee/coffee.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
Mono/Monaco/vs/basic-languages/cpp/cpp.js
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
Mono/Monaco/vs/basic-languages/cpp/cpp.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
Mono/Monaco/vs/basic-languages/csharp/csharp.js
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
Mono/Monaco/vs/basic-languages/csharp/csharp.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
Mono/Monaco/vs/basic-languages/csp/csp.js
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
Mono/Monaco/vs/basic-languages/csp/csp.js
Resource
win10v2004-20240709-en
General
-
Target
Mono/Monaco/Monaco.html
-
Size
6KB
-
MD5
999896134bd43cefa865f37e514ba62f
-
SHA1
97077125bb36ba072e30f2ec68f80ae213f76b84
-
SHA256
1ecdd9529ef5487f92736894d94ff680f6c32ee821615d29c0fc814f3a310b4a
-
SHA512
6af01d1c9d4212e25fc35e9ae0730538f01b3d62cd904fec90077030ede5b07af952388e57927f3518895580b95263c70372f791a247572da657e70bf8c3ab47
-
SSDEEP
192:wEod3PorvFhAmQp5keghKcCI2MCTJ3+NLSaPh/WCY/jt:ud3PonBw5keghHwjt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3840 msedge.exe 3840 msedge.exe 3356 msedge.exe 3356 msedge.exe 1368 identity_helper.exe 1368 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3356 wrote to memory of 2032 3356 msedge.exe 85 PID 3356 wrote to memory of 2032 3356 msedge.exe 85 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 4540 3356 msedge.exe 86 PID 3356 wrote to memory of 3840 3356 msedge.exe 87 PID 3356 wrote to memory of 3840 3356 msedge.exe 87 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88 PID 3356 wrote to memory of 1280 3356 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Mono\Monaco\Monaco.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8aec446f8,0x7ff8aec44708,0x7ff8aec447182⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,1133496696331521252,13367639943988522433,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,1133496696331521252,13367639943988522433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,1133496696331521252,13367639943988522433,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1133496696331521252,13367639943988522433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1133496696331521252,13367639943988522433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,1133496696331521252,13367639943988522433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 /prefetch:82⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,1133496696331521252,13367639943988522433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1133496696331521252,13367639943988522433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1133496696331521252,13367639943988522433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1133496696331521252,13367639943988522433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1133496696331521252,13367639943988522433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:1216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
Filesize
6KB
MD595e1f2056111901881334dca6dd71301
SHA1120a8f82604fcb500595b36a96e58f8abbdedb9a
SHA256a5aa3c451eda27b7418bf1c1c4ed118d971285f9b8d5b620d02a6b034c5aedb7
SHA512d45489d21e16d0fa0b74ee0609a79afd7a006c6289babee3e2087ac55e52cf752ca51a00553290b4a6f18109fec07be4e3cc993ea4709336e35f486ce8348105
-
Filesize
6KB
MD5171da942e17efd8bcecb6a438405b43b
SHA1d8a964c2929a7e2a7bbddcdf8ace30512935edb5
SHA256865e9b6913f77df58c30c83d9de6ef1da77b7ca3869a0673d99c5a1fbb3798b6
SHA512ba05fca0ae43219f31ef2e245ec2e692e975710bf3dd849da54159d0ee480a6d7ba7416af65b79af6d8e229e0e703bd85583c20e4c6563754cd1eef739dbc52a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ca09fad28970b7ca5664c308ea7e29c7
SHA16a3bb8fc6ce202350fba1a8048a8bc6c7bb61f28
SHA256d72ec6298a6b1a0d159b4df4251091e0f8452262179cbfbb23e3e4420bf89eea
SHA5127d9e67de2b8a2e5ef813a74027d422d9da9bd19ad2af003a68799274bc7f36f427356dc81c1b163c3c73444c625c085c0216b3d8f304b88d1d0e3d7179e00e54