Analysis
-
max time kernel
163s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
24-01-2022 01:29
Static task
static1
Behavioral task
behavioral1
Sample
9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe
Resource
win10-en-20211208
General
-
Target
9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe
-
Size
513KB
-
MD5
85ffc86df081fdc9c5d56546ec1303d9
-
SHA1
890a52b1d59768fb66b563b3534650505d24c0c5
-
SHA256
9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885
-
SHA512
fa8dc635b1a745ef5db5debd424b08b287d16726c84d8e27885465da7689b73aa2dfc221747bda2083a989072f3bbda9694a932e3619819ec3cf0f051f5b3ebb
Malware Config
Signatures
-
Detect Neshta Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/504-120-0x0000000000400000-0x0000000000789000-memory.dmp family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi/Revil sample 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe family_sodinokobi C:\Users\Admin\AppData\Local\Temp\3582-490\9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe family_sodinokobi -
Executes dropped EXE 1 IoCs
Processes:
9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exepid process 2968 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 53 IoCs
Processes:
9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exedescription ioc process File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\armsvc.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\WINDOW~2\WinMail.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\WINDOW~4\ACCESS~1\wordpad.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe -
Drops file in Windows directory 1 IoCs
Processes:
9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exedescription ioc process File opened for modification C:\Windows\svchost.com 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 932 504 WerFault.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe 1940 504 WerFault.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe 420 504 WerFault.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe 2408 504 WerFault.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe 3316 504 WerFault.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe 2068 504 WerFault.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe 3540 2968 WerFault.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe 3648 504 WerFault.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe 1928 504 WerFault.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe -
Modifies registry class 1 IoCs
Processes:
9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 932 WerFault.exe 932 WerFault.exe 932 WerFault.exe 932 WerFault.exe 932 WerFault.exe 932 WerFault.exe 932 WerFault.exe 932 WerFault.exe 932 WerFault.exe 932 WerFault.exe 932 WerFault.exe 932 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 1940 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 420 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 2408 WerFault.exe 3316 WerFault.exe 3316 WerFault.exe 3316 WerFault.exe 3316 WerFault.exe 3316 WerFault.exe 3316 WerFault.exe 3316 WerFault.exe 3316 WerFault.exe 3316 WerFault.exe 3316 WerFault.exe 3316 WerFault.exe 3316 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 932 WerFault.exe Token: SeBackupPrivilege 932 WerFault.exe Token: SeDebugPrivilege 932 WerFault.exe Token: SeDebugPrivilege 1940 WerFault.exe Token: SeDebugPrivilege 420 WerFault.exe Token: SeDebugPrivilege 2408 WerFault.exe Token: SeDebugPrivilege 3316 WerFault.exe Token: SeDebugPrivilege 2068 WerFault.exe Token: SeDebugPrivilege 3540 WerFault.exe Token: SeDebugPrivilege 3648 WerFault.exe Token: SeDebugPrivilege 1928 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exedescription pid process target process PID 504 wrote to memory of 2968 504 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe PID 504 wrote to memory of 2968 504 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe PID 504 wrote to memory of 2968 504 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe 9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe"C:\Users\Admin\AppData\Local\Temp\9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 504 -s 8642⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 504 -s 8762⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 504 -s 9682⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 504 -s 10202⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 504 -s 9882⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 504 -s 9722⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe"2⤵
- Executes dropped EXE
PID:2968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 2323⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 504 -s 12442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 504 -s 11682⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe
MD5649ff497debe579e8d2717c7e6127bce
SHA1009434c92402b7e1abdf5622cdd9507ba5c1a01f
SHA256dd15f8cf54916066e76cb48b73cc20af566e16833648328dfff4605a5c49da99
SHA5125958f8c8e3521ae52d2bfba55092b738576bf5b38e428949169e7fcecf4286b9c04240b77b226d74e5132675b21dd3e301930d6ca5ce770e634795d132ddeabc
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9be084ce0587d50c894f337439b0f93c42da949bb1aa7d98e1f86f9df37d8885.exe
MD5649ff497debe579e8d2717c7e6127bce
SHA1009434c92402b7e1abdf5622cdd9507ba5c1a01f
SHA256dd15f8cf54916066e76cb48b73cc20af566e16833648328dfff4605a5c49da99
SHA5125958f8c8e3521ae52d2bfba55092b738576bf5b38e428949169e7fcecf4286b9c04240b77b226d74e5132675b21dd3e301930d6ca5ce770e634795d132ddeabc