Analysis
-
max time kernel
170s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 16:58
Static task
static1
Behavioral task
behavioral1
Sample
4ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
4ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51.exe
Resource
win10v2004-20220718-en
General
-
Target
4ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51.exe
-
Size
424KB
-
MD5
627e7f4f2a1e8436da14489e7215b7da
-
SHA1
d72ecb51d1a6a0f18f0939c37ed06a0b90b50a0e
-
SHA256
4ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51
-
SHA512
da583a7ff28f0aa65ac360e66717e7b53fe911cdabc592fde03e914b21cb18f703c45f3f59045f32af4f686bec841651849f97ddfd2e4155f1577b12b35f9c97
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2783062828-828903012-4218294845-1000\_RECoVERY_+jxhbx.txt
teslacrypt
http://pts764gt354fder34fsqw45gdfsavadfgsfg.kraskula.com/19265329CFA33DBC
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/19265329CFA33DBC
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/19265329CFA33DBC
http://xlowfznrg4wf7dli.ONION/19265329CFA33DBC
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 4124 xyoejxqhbuad.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2783062828-828903012-4218294845-1000\Control Panel\International\Geo\Nation 4ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51.exe Key value queried \REGISTRY\USER\S-1-5-21-2783062828-828903012-4218294845-1000\Control Panel\International\Geo\Nation xyoejxqhbuad.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2783062828-828903012-4218294845-1000\Software\Microsoft\Windows\CurrentVersion\Run xyoejxqhbuad.exe Set value (str) \REGISTRY\USER\S-1-5-21-2783062828-828903012-4218294845-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vtasbjkloxbj = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\xyoejxqhbuad.exe\"" xyoejxqhbuad.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\LogoBeta.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\_RECoVERY_+jxhbx.html xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\1033\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\es.pak xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\blafdoc.css xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\en\_RECoVERY_+jxhbx.html xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\AugLoop\_RECoVERY_+jxhbx.html xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\no\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\amd64\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_RECoVERY_+jxhbx.html xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_default_win7.css xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\ext\_RECoVERY_+jxhbx.html xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.XLS xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Library\Analysis\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\sv\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\sv\_RECoVERY_+jxhbx.html xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.contrast-white_scale-180.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\th-TH\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\_RECoVERY_+jxhbx.html xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\_RECoVERY_+jxhbx.html xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_ghost_company.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\bg\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\_RECoVERY_+jxhbx.html xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_RECoVERY_+jxhbx.html xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_RECoVERY_+jxhbx.html xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\date-span-16.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientVolumeLicense_eula.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\_RECoVERY_+jxhbx.html xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-black_scale-80.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\lt\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\sr-Cyrl-BA\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Redshift\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientLangPack_eula.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\security\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\en-us\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\uk\_RECoVERY_+jxhbx.html xyoejxqhbuad.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Internet Explorer\images\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_RECoVERY_+jxhbx.html xyoejxqhbuad.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\ja\_RECoVERY_+jxhbx.png xyoejxqhbuad.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\7-Zip\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\he-IL\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\_RECoVERY_+jxhbx.txt xyoejxqhbuad.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\xyoejxqhbuad.exe 4ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51.exe File opened for modification C:\Windows\xyoejxqhbuad.exe 4ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe 4124 xyoejxqhbuad.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 1844 4ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51.exe Token: SeDebugPrivilege 4124 xyoejxqhbuad.exe Token: SeIncreaseQuotaPrivilege 3448 WMIC.exe Token: SeSecurityPrivilege 3448 WMIC.exe Token: SeTakeOwnershipPrivilege 3448 WMIC.exe Token: SeLoadDriverPrivilege 3448 WMIC.exe Token: SeSystemProfilePrivilege 3448 WMIC.exe Token: SeSystemtimePrivilege 3448 WMIC.exe Token: SeProfSingleProcessPrivilege 3448 WMIC.exe Token: SeIncBasePriorityPrivilege 3448 WMIC.exe Token: SeCreatePagefilePrivilege 3448 WMIC.exe Token: SeBackupPrivilege 3448 WMIC.exe Token: SeRestorePrivilege 3448 WMIC.exe Token: SeShutdownPrivilege 3448 WMIC.exe Token: SeDebugPrivilege 3448 WMIC.exe Token: SeSystemEnvironmentPrivilege 3448 WMIC.exe Token: SeRemoteShutdownPrivilege 3448 WMIC.exe Token: SeUndockPrivilege 3448 WMIC.exe Token: SeManageVolumePrivilege 3448 WMIC.exe Token: 33 3448 WMIC.exe Token: 34 3448 WMIC.exe Token: 35 3448 WMIC.exe Token: 36 3448 WMIC.exe Token: SeIncreaseQuotaPrivilege 3448 WMIC.exe Token: SeSecurityPrivilege 3448 WMIC.exe Token: SeTakeOwnershipPrivilege 3448 WMIC.exe Token: SeLoadDriverPrivilege 3448 WMIC.exe Token: SeSystemProfilePrivilege 3448 WMIC.exe Token: SeSystemtimePrivilege 3448 WMIC.exe Token: SeProfSingleProcessPrivilege 3448 WMIC.exe Token: SeIncBasePriorityPrivilege 3448 WMIC.exe Token: SeCreatePagefilePrivilege 3448 WMIC.exe Token: SeBackupPrivilege 3448 WMIC.exe Token: SeRestorePrivilege 3448 WMIC.exe Token: SeShutdownPrivilege 3448 WMIC.exe Token: SeDebugPrivilege 3448 WMIC.exe Token: SeSystemEnvironmentPrivilege 3448 WMIC.exe Token: SeRemoteShutdownPrivilege 3448 WMIC.exe Token: SeUndockPrivilege 3448 WMIC.exe Token: SeManageVolumePrivilege 3448 WMIC.exe Token: 33 3448 WMIC.exe Token: 34 3448 WMIC.exe Token: 35 3448 WMIC.exe Token: 36 3448 WMIC.exe Token: SeBackupPrivilege 4396 vssvc.exe Token: SeRestorePrivilege 4396 vssvc.exe Token: SeAuditPrivilege 4396 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1844 wrote to memory of 4124 1844 4ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51.exe 77 PID 1844 wrote to memory of 4124 1844 4ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51.exe 77 PID 1844 wrote to memory of 4124 1844 4ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51.exe 77 PID 1844 wrote to memory of 4132 1844 4ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51.exe 78 PID 1844 wrote to memory of 4132 1844 4ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51.exe 78 PID 1844 wrote to memory of 4132 1844 4ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51.exe 78 PID 4124 wrote to memory of 3448 4124 xyoejxqhbuad.exe 80 PID 4124 wrote to memory of 3448 4124 xyoejxqhbuad.exe 80 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xyoejxqhbuad.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" xyoejxqhbuad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51.exe"C:\Users\Admin\AppData\Local\Temp\4ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\xyoejxqhbuad.exeC:\Windows\xyoejxqhbuad.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4124 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\4EA468~1.EXE2⤵PID:4132
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD5627e7f4f2a1e8436da14489e7215b7da
SHA1d72ecb51d1a6a0f18f0939c37ed06a0b90b50a0e
SHA2564ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51
SHA512da583a7ff28f0aa65ac360e66717e7b53fe911cdabc592fde03e914b21cb18f703c45f3f59045f32af4f686bec841651849f97ddfd2e4155f1577b12b35f9c97
-
Filesize
424KB
MD5627e7f4f2a1e8436da14489e7215b7da
SHA1d72ecb51d1a6a0f18f0939c37ed06a0b90b50a0e
SHA2564ea468d8b8015903bba0103eec44f772492a93c3d345d81bae253a492d8b1f51
SHA512da583a7ff28f0aa65ac360e66717e7b53fe911cdabc592fde03e914b21cb18f703c45f3f59045f32af4f686bec841651849f97ddfd2e4155f1577b12b35f9c97