Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
14/07/2024, 00:15
240714-akbwvs1gjn 6Analysis
-
max time kernel
35s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 00:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1IKPX-f9mE1jn8ytUW4Lq5MTDvrZDV6B7/view?usp=sharing
Resource
win10v2004-20240709-en
General
-
Target
https://drive.google.com/file/d/1IKPX-f9mE1jn8ytUW4Lq5MTDvrZDV6B7/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 6 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3976 msedge.exe 3976 msedge.exe 4152 msedge.exe 4152 msedge.exe 4304 identity_helper.exe 4304 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4152 wrote to memory of 396 4152 msedge.exe 83 PID 4152 wrote to memory of 396 4152 msedge.exe 83 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 2208 4152 msedge.exe 84 PID 4152 wrote to memory of 3976 4152 msedge.exe 85 PID 4152 wrote to memory of 3976 4152 msedge.exe 85 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86 PID 4152 wrote to memory of 1604 4152 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1IKPX-f9mE1jn8ytUW4Lq5MTDvrZDV6B7/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe32fe46f8,0x7ffe32fe4708,0x7ffe32fe47182⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,5035348192886388970,17349705335961942343,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,5035348192886388970,17349705335961942343,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,5035348192886388970,17349705335961942343,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,5035348192886388970,17349705335961942343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,5035348192886388970,17349705335961942343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,5035348192886388970,17349705335961942343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,5035348192886388970,17349705335961942343,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,5035348192886388970,17349705335961942343,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,5035348192886388970,17349705335961942343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,5035348192886388970,17349705335961942343,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,5035348192886388970,17349705335961942343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,5035348192886388970,17349705335961942343,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,5035348192886388970,17349705335961942343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2000,5035348192886388970,17349705335961942343,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,5035348192886388970,17349705335961942343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:2272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD56e85fa22f8d6396183445c15b82ab94f
SHA11e6151b47c18d358411ebe7203fdd8c76fd90857
SHA256e6a7fa80387720ec0f48cc7b564e395d39083a128fd3c1ecfa870f6d3232eee8
SHA5128bd785d9f6478a80e02b190e691dfff8d47e50532bf6095d980bec3487f328c2be3a7a43429031504332402cd52f9d186b664c41a2baf3badaf228c8102e3838
-
Filesize
3KB
MD5a0736038b1f5b94dbc0279fc350a1b7f
SHA19497f4596ce7272faa7734c1d7f7bb3a5919a537
SHA256d8c0c85bc30c00c8bd2a142e128cbee25775139b9cd5a930b632749f3fffb36e
SHA512468dca586ba18182a8c1873e65f15946210ee105de4498cb0af9f2c58dc694ce745d9f587b4f90d83347914637fa61fbe6feb543032f08de8062eb32a8c92511
-
Filesize
6KB
MD5e9697e2c6f6089214b8023e9e7136ac2
SHA1cd586204029e5f3bb3bb48d6a5f579c901a872ee
SHA256cfddbfed85face91b52d06f74b98318ed8b3a803275bd499cf6781d12e4d18b5
SHA5126aeac52fa7249be9934965617eaefca4dc1aa84ac3a0b5fd50a5f7ef740eec6ac0477bfced658c90ff3f2cde4512547928266ab89319669986f7c8df64254cd3
-
Filesize
6KB
MD525cf2ff4070e3ea51fe962fbc446f203
SHA10c20f85029f88d026a97dfb3c32db90d23c97baf
SHA256f954b77024ea26b7b6431832d297e3624ec319bb6e99b3fd90bd72d9d75f09e4
SHA512d137052f64b192d6845b4d4206b05527504c2b5f7a2db71d8cdb406a0b6cd123120810d6a74cd947642d2e706f59c40b24d343cf110e0356a66d4c8656ed6368
-
Filesize
7KB
MD5d9727116daaf34ad8321e8bebfc82027
SHA1f19ec4f9f6efd6784d655bcad29506428c5369bd
SHA25666b1b520ff1f35e0a35a3022e3a50ec3f22fc95a7e96584229de2ea6b3acbd6b
SHA512df9a3ce92bb01df09074f577daa9d683a8dacd88117a834dabee19bbd1b01f7a579a791126ff4368eb7ea32f0eff233353dbc9b2e86a3657a48e51196b2c0d1a
-
Filesize
7KB
MD57076af0ca677e1894574bf87d3f1f70e
SHA1f81b05b62e5ae54dde61674bab0f684aeff81b9b
SHA2564359850c77d8de98fd73c3af4ccfa65a3e45ec417f8c74b491a84f29f8017f35
SHA512d69ae69d2b91bf8be23d583debdeeb8830d71803ce24a347c3818ce1695941dc9efc9af262402f12b1aa33eaec84779036bf42e0d765601b2d8ec141ab1cee69
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50b8e3567ece4e3fa824131b21e3ddd8e
SHA16cb6463456e9dd0dbbd93baac78a95804adbd725
SHA256377f697747e8248bdcd69beb89bb1bb89ba9d08178f9f900a73bf39b53d55e09
SHA512d37a3e62110b7e68ed4344f2e7c78c6fa615df07aa7d6059f5f7ed38d660bffa7eb1c82925e9358fbc2014182c257ad941c0898f76dcffa642b647e1777d15d5
-
Filesize
11KB
MD51036eab11e81a872c1aee505e14992cb
SHA15343e63ce335620781ec09b14ed20b1af0cbeaad
SHA256f94ecc422d99f041831c53bee50ebe639671613505159ff3f99622bdaf6d4a93
SHA512852ea93b6061d1ff6710cb4ed96ceb13bc8877ff74021954599dd1b2e66e8f87a684b30931a9ddc8cbef71eba70f12d9ace9c3368044e4dd1430699449776a51
-
Filesize
18.8MB
MD5f5276b18a6f40e33c1e5483cc687cbe4
SHA1b859e1b572dacaf824caf7b9e89a05295a386cf6
SHA25650091e5ef800ef09f93fc47d2fc7cd5bc244457c7537e3eb2a4c43d2565c431e
SHA512ce1dce480c428aeaea02fee963878e6b152205f2d0ab4f3e1f1ca49bdd4482896bb8f0ba9f97d6f1994435b61d330bd9b06e496e8edd59ff347dbadcaacffbb5