Analysis
-
max time kernel
591s -
max time network
526s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-de -
resource tags
arch:x64arch:x86image:win10v2004-20240802-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
21-08-2024 23:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1whu3sKw4uQoj72DD3mvELIKOb6YKfipO/view?usp=sharing
Resource
win10v2004-20240802-de
General
-
Target
https://drive.google.com/file/d/1whu3sKw4uQoj72DD3mvELIKOb6YKfipO/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 drive.google.com 16 drive.google.com 18 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2472 msedge.exe 2472 msedge.exe 1828 msedge.exe 1828 msedge.exe 1216 identity_helper.exe 1216 identity_helper.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1828 wrote to memory of 4440 1828 msedge.exe 84 PID 1828 wrote to memory of 4440 1828 msedge.exe 84 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 1964 1828 msedge.exe 87 PID 1828 wrote to memory of 2472 1828 msedge.exe 88 PID 1828 wrote to memory of 2472 1828 msedge.exe 88 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89 PID 1828 wrote to memory of 4556 1828 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1whu3sKw4uQoj72DD3mvELIKOb6YKfipO/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa66f146f8,0x7ffa66f14708,0x7ffa66f147182⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,15791297722080692590,1831250598612123905,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,15791297722080692590,1831250598612123905,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,15791297722080692590,1831250598612123905,131072 --lang=de --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15791297722080692590,1831250598612123905,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15791297722080692590,1831250598612123905,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15791297722080692590,1831250598612123905,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,15791297722080692590,1831250598612123905,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:82⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,15791297722080692590,1831250598612123905,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15791297722080692590,1831250598612123905,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15791297722080692590,1831250598612123905,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15791297722080692590,1831250598612123905,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,15791297722080692590,1831250598612123905,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,15791297722080692590,1831250598612123905,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD55e89c239cdf4e75556e3a58f307ef877
SHA1bf1985cdc17f6f605893e8e223ea0cb0ea37cd6d
SHA256c9863ba5fdcfe20ee7d354a3e7a9213352e77908963e2dcbb6f7f384aa9efa62
SHA512f6a520e864019756680f980307fe3d7ae545bf643c7dac8719884d516abf7fc95112043609ed0a9bc8c72d6511deb85ab614f086b206ea762b762251b9b83b3d
-
Filesize
3KB
MD502bcbcbfcd67e0ee5679199604d66da8
SHA1d1201aa8ff59cf2b3df2851a80c92f64d82020d8
SHA256639009bb9c094a64a3f0a588eb5421beadd6965cb9461c0a8ada91dd8a7172ba
SHA512bc22557e74e829e768856eb0d46f5b9a9c2324f4e49e0af9f814b362462c4a54e21cad3ba61d66c4a4792581c62643c6085c50f26bc1115e96dee4285cead33a
-
Filesize
3KB
MD509a24e0023524337acfb5f9f63c5e38c
SHA115143d4f0580712770a0b137a49a48099d65deea
SHA2562e217c4a895d33bb9a5318fce330a8ef56b36998c0c6a09c006862f7267638d1
SHA51290b7526a0d057760465cef12cd472431e5c17b76284210a76d04c94b6811248d418b7f041475709ee72ca0b8336ed8a4cf4ab522a35624ec5a2b62e0d71cd66a
-
Filesize
3KB
MD5754c06879bd1a33ee812a40279cf7cb4
SHA10cf4ec2982f09cf5994b13390e0ee94a167f7a98
SHA2561ba3571d08682fa32d8feb3025e36122cdf5dfac2f2f580fd8a7f8c5aaa1b007
SHA512e1cb427b7b7341bcc5264ab922f243fb5a60b4235540db5917dd61568c9230ab4d8e884635b8d67854635c96e31bf79b37667eb6f2f10ce5541c832175b297c5
-
Filesize
3KB
MD5744ed683c4722534f34eed0687a2796c
SHA13b9710ffbed1bb6654ab08960f7678ab58f5c097
SHA25620d4907460fe318ab55b04bda69fbdd5e9ab200a09d51aaed96fb6faedce7267
SHA512965cbc9f43b61b2c45c6f3d53782e5883107b0a76a0d1676210f7bfe7d8b951b485a497f46c309912b99bc2a420d9137d13778ffd883f03206d2290dab93b6cd
-
Filesize
3KB
MD555a9cdd617b1eb351ad03f190abb6a30
SHA1493521436ae995dc43f901bd0dbb41093b0feb92
SHA2565edfaa037234dca509947d6377dea8a22324ec6a4b61525d820a554b68dad42c
SHA5128c3d2917f949d596ac935d035913fec841d15d17938de2186d9eaf647b8ac4b821c960076f9c50c40ba3256d774cf60e4e7502ce3f7ea5e2dbcc1419a273b1b3
-
Filesize
3KB
MD5832c352533e28e8618f7f0e7c8d5150f
SHA1fca746c3155d261777b4aae6af7660320f03a676
SHA2566e0bd0a3805c083cb0a8f328c38ecb8a9190a367874bbd8fcbe02133ed66bb04
SHA512cb26a6911ffbf3db7378fcd4b45aa7544997364e5fdc092ab03e961ce1d23fd6eb59d30920a4db8dc0c96ca72aeea22c9e3d965ca56074d4be6edade63736755
-
Filesize
3KB
MD5ea24a4e7634c7635771670df698fd9f4
SHA136d2f18c626dd1a8890cfb9bdf5440517703cdb7
SHA25687eec95198c3ace6dfdc0fe46fad18bb94a5b7ee874f8c400097c2f53daea968
SHA5129b63449ae9b4b2038e086c2357391d09cdf8973a8b90189315d681f24a76ded5d37105f6f38d9a31685e06d9e81b2fa9638b3d68369560946558c26420a7ff56
-
Filesize
5KB
MD5399c8b1c5b7020227b1b9029c756e7b5
SHA1a875ed355c25805e4056b4fcd7c39cd3a59b4591
SHA256cdb39d32c667044cb24482791fe4dba86ad19462f3dc51c1226984897cfc3084
SHA512b2b9eb64826e17d3f36a278a2782c600e40e3a481b956df45a5ba347945f035c364419566d8579a00e9fcbe642ffefc8ee290f52bd2715f450a27cf58dd6dae1
-
Filesize
6KB
MD504a9cfab59c15160b45ccbf5a22da4d7
SHA1a6dfd432f8473802b2d2c4b30a9904277d6f16a2
SHA256b135ccfc33ecc09b4d99334484d7c7604ae804f2d127a6d8429f78eb117c0565
SHA51270fe6367fe2181e3fe9d3a390f399139d0d99d21a73b6c3ef5e3c8efd0e647d5ecac5ca11e2b18f08085e68d56c68cadf87ded9dd2dc52c7e84aae295db1b57e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50f41a65b1cb59dacb162d34f1b9097c8
SHA140bbb6e46a372886443728c62a8f15e39c829af9
SHA256234f1c91ecec3f9d762fc1b004e40718f3b184a3caeeee850e1e3813db8e2bca
SHA512beea71ca591b5d0cda49e2ba8ecefb32d893ffd77fc6a25348716daaf7656505aca23004495ca72557ea2d2d68963bd496ee25058f3ed1c0bd519231e5ab9e18