Overview
overview
3Static
static
3mineways/Mineways.exe
windows11-21h2-x64
1mineways/T...er.exe
windows11-21h2-x64
1mineways/T...er.exe
windows11-21h2-x64
1mineways/d...y.html
windows11-21h2-x64
3mineways/d...t.html
windows11-21h2-x64
3mineways/d...s.html
windows11-21h2-x64
3mineways/d...x.html
windows11-21h2-x64
3mineways/d...s.html
windows11-21h2-x64
3mineways/d...e.html
windows11-21h2-x64
3mineways/d...ipt.js
windows11-21h2-x64
3mineways/d...g.html
windows11-21h2-x64
3mineways/d...s.html
windows11-21h2-x64
3mineways/f...32.exe
windows11-21h2-x64
3mineways/mineways.bat
windows11-21h2-x64
1mineways/m...og.bat
windows11-21h2-x64
1mineways/m...ug.bat
windows11-21h2-x64
1mineways/m...ds.bat
windows11-21h2-x64
1mineways/s...map.py
windows11-21h2-x64
3mineways/s...es.bat
windows11-21h2-x64
1mineways/s...te.bat
windows11-21h2-x64
1mineways/s...eld.py
windows11-21h2-x64
3mineways/s...ker.py
windows11-21h2-x64
3mineways/s...aps.py
windows11-21h2-x64
3mineways/s...ap.bat
windows11-21h2-x64
1mineways/s...or.bat
windows11-21h2-x64
1Analysis
-
max time kernel
1146s -
max time network
1160s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/08/2024, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
mineways/Mineways.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
mineways/TileMaker/ChannelMixer.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
mineways/TileMaker/TileMaker.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
mineways/docs/community.html
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
mineways/docs/contact.html
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
mineways/docs/downloads.html
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
mineways/docs/index.html
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
mineways/docs/mineways.html
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
mineways/docs/reference.html
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
mineways/docs/script.js
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
mineways/docs/scripting.html
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
mineways/docs/textures.html
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
mineways/for_old_machines_Mineways32.exe
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
mineways/mineways.bat
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
mineways/mineways_debug_log.bat
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
mineways/mineways_min_debug.bat
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
mineways/mineways_without_worlds.bat
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
mineways/scripting/annotate_map.py
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
mineways/scripting/build_jgrtx_terrain_files.bat
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
mineways/scripting/export_and_annotate.bat
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
mineways/scripting/heightfield.py
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
mineways/scripting/hunk_maker.py
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
mineways/scripting/make_slice_maps.py
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
mineways/scripting/mineways_annotate_map.bat
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
mineways/scripting/register-Mineways-run-as-administrator.bat
Resource
win11-20240802-en
General
-
Target
mineways/docs/reference.html
-
Size
24KB
-
MD5
f033d9faf7f087015eb16f26774e85e5
-
SHA1
8a74bf03421015dbc24104dd408658afc944daf4
-
SHA256
a3b25a094dc97587f3f8baaf1c5dcaf5a50798e78d4442ad2485dc8de4dc6ef4
-
SHA512
be59ea7eeee6e2326f470ed2c975f1d139fe969ca7f0a14c2907c2cba3bf646de2449b84e50f5cc08b3bb3b5525ea42696600f4be4d5ab02070c62b8c37be3ae
-
SSDEEP
384:pRvG/svTHQJ666Px53havhFZCMdBexwZScmnGTOiI8VJY4Iv5n7nRmnAUn6cl:Jvizc5xavRTpScAiI8ExT2A+6cl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2540 msedge.exe 2540 msedge.exe 476 msedge.exe 476 msedge.exe 2216 msedge.exe 2216 msedge.exe 112 identity_helper.exe 112 identity_helper.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe 476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 476 wrote to memory of 888 476 msedge.exe 79 PID 476 wrote to memory of 888 476 msedge.exe 79 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 1540 476 msedge.exe 80 PID 476 wrote to memory of 2540 476 msedge.exe 81 PID 476 wrote to memory of 2540 476 msedge.exe 81 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82 PID 476 wrote to memory of 2140 476 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\mineways\docs\reference.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffecd563cb8,0x7ffecd563cc8,0x7ffecd563cd82⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,7414521037851807797,17053268376488851491,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,7414521037851807797,17053268376488851491,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,7414521037851807797,17053268376488851491,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7414521037851807797,17053268376488851491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7414521037851807797,17053268376488851491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7414521037851807797,17053268376488851491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7414521037851807797,17053268376488851491,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7414521037851807797,17053268376488851491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,7414521037851807797,17053268376488851491,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,7414521037851807797,17053268376488851491,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,7414521037851807797,17053268376488851491,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,7414521037851807797,17053268376488851491,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59828ffacf3deee7f4c1300366ec22fab
SHA19aff54b57502b0fc2be1b0b4b3380256fb785602
SHA256a3d21f0fb6563a5c9d0f7a6e9c125ec3faaa86ff43f37cb85a8778abc87950f7
SHA5122e73ea4d2fcd7c8d52487816110f5f4a808ed636ae87dd119702d1cd1ae315cbb25c8094a9dddf18f07472b4deaed3e7e26c9b499334b26bdb70d4fa7f84168d
-
Filesize
152B
MD56fdbe80e9fe20761b59e8f32398f4b14
SHA1049b1f0c6fc4e93a4ba6b3c992f1d6cecf3ada1f
SHA256b7f0d9ece2307bdc4f05a2d814c947451b007067ff8af977f77f06c3d5706942
SHA512cf25c7fd0d6eccc46e7b58949c16d17ebeefb7edd6c76aa62f7ab5da52d1c6fc88bde620be40396d336789bd0d62b2162209a947d7ab69389e8c03682e880234
-
Filesize
183B
MD59e1275231d0007b3a42906cdadb34ea6
SHA1de552221fd88afa25f6cdeceed2c825d4b40e41e
SHA2563ac46af51f438f21927049f96db54e3060b81606bc3c1acfae0e125ac5c530e8
SHA5125db406df1b09a4bc46c299deb653b949ab1dc6701977c5d964d1969333ea620585a5773ab3557ca87d19d18727e040a38285aca132828ff3491bb40a1dbee521
-
Filesize
5KB
MD5bbd67269e02997344751fdbf56f50aa0
SHA16229001ee1f66d1aea6798cda8c800e5cce45f26
SHA25681c86d7178f135da8ba50dfabedefd21797f2d2ffe50e01b96217c69f19b21d3
SHA51213b35913624ff8cd9b5786d9bb570d48db88986540265b65229d2aeaec5fd73894a1d223efeac79ceef128aadbb0357868d915aa2128eb152b843a41bce2685b
-
Filesize
6KB
MD5a0bd5c0e770466a3f930cb460a880f52
SHA1c5065621f3249ff007cacd883c9b12e37c75c98c
SHA256b25809e5c719f86e71802ad2f668ba11d64f2810da4cbc0f772c0624f859d9b1
SHA512eff65edfba7e62ef9cf75a6899b6bd98d881752078f9104030e070685c7172fdf3db0e40b89ad4ca569ce536ab407ad38d034921bf5751064a333d6577934160
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ceae2ff90fc9e61f09f648994299f311
SHA1a82b075c4b41e4f3fb63ba6fbaad47ae706d2055
SHA256b0254ecf7d77b844949d6e399ed76c045861c0a6104370189f8c63d54c448e11
SHA512ddcf051af5b1db912ee1309851d54a96916d1477beb0f3fa212ca09944e647d3f8ed34081d20e7729a8cef86cc42064523af0be02a2d66c6889019fb3c10bf14