Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16/09/2022, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
9ea83af5875395e4c089df103ddbb9022fd6670fb749ecacfcf53456b9f8cf78.exe
Resource
win10v2004-20220812-en
General
-
Target
9ea83af5875395e4c089df103ddbb9022fd6670fb749ecacfcf53456b9f8cf78.exe
-
Size
719KB
-
MD5
0c1bcd1c2923fe640eeb3cc49783c588
-
SHA1
27786a4668b81e84d321c14288e2d65bfd5688fa
-
SHA256
9ea83af5875395e4c089df103ddbb9022fd6670fb749ecacfcf53456b9f8cf78
-
SHA512
19bc349ba61960db9b5682ddafdcbbbf6074f48dd0a03e66522c888c34ceb3027f0c610c490cac2b981c88881fabbe3293708bdc41b41604ff36459cc762569a
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2176 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2380 schtasks.exe 3068 schtasks.exe 3280 schtasks.exe 2340 schtasks.exe 2520 schtasks.exe 2540 schtasks.exe 3260 schtasks.exe 4268 schtasks.exe 780 schtasks.exe 4608 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3476 powershell.exe 3476 powershell.exe 444 powershell.exe 444 powershell.exe 3424 powershell.exe 3424 powershell.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe 2176 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3476 powershell.exe Token: SeDebugPrivilege 4624 9ea83af5875395e4c089df103ddbb9022fd6670fb749ecacfcf53456b9f8cf78.exe Token: SeDebugPrivilege 444 powershell.exe Token: SeDebugPrivilege 3424 powershell.exe Token: SeDebugPrivilege 2176 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4624 wrote to memory of 4968 4624 9ea83af5875395e4c089df103ddbb9022fd6670fb749ecacfcf53456b9f8cf78.exe 80 PID 4624 wrote to memory of 4968 4624 9ea83af5875395e4c089df103ddbb9022fd6670fb749ecacfcf53456b9f8cf78.exe 80 PID 4624 wrote to memory of 4968 4624 9ea83af5875395e4c089df103ddbb9022fd6670fb749ecacfcf53456b9f8cf78.exe 80 PID 4968 wrote to memory of 3232 4968 cmd.exe 82 PID 4968 wrote to memory of 3232 4968 cmd.exe 82 PID 4968 wrote to memory of 3232 4968 cmd.exe 82 PID 4968 wrote to memory of 3476 4968 cmd.exe 83 PID 4968 wrote to memory of 3476 4968 cmd.exe 83 PID 4968 wrote to memory of 3476 4968 cmd.exe 83 PID 4968 wrote to memory of 444 4968 cmd.exe 87 PID 4968 wrote to memory of 444 4968 cmd.exe 87 PID 4968 wrote to memory of 444 4968 cmd.exe 87 PID 4968 wrote to memory of 3424 4968 cmd.exe 89 PID 4968 wrote to memory of 3424 4968 cmd.exe 89 PID 4968 wrote to memory of 3424 4968 cmd.exe 89 PID 4624 wrote to memory of 2176 4624 9ea83af5875395e4c089df103ddbb9022fd6670fb749ecacfcf53456b9f8cf78.exe 92 PID 4624 wrote to memory of 2176 4624 9ea83af5875395e4c089df103ddbb9022fd6670fb749ecacfcf53456b9f8cf78.exe 92 PID 4624 wrote to memory of 2176 4624 9ea83af5875395e4c089df103ddbb9022fd6670fb749ecacfcf53456b9f8cf78.exe 92 PID 2176 wrote to memory of 4636 2176 dllhost.exe 111 PID 2176 wrote to memory of 4636 2176 dllhost.exe 111 PID 2176 wrote to memory of 4636 2176 dllhost.exe 111 PID 2176 wrote to memory of 4652 2176 dllhost.exe 110 PID 2176 wrote to memory of 4652 2176 dllhost.exe 110 PID 2176 wrote to memory of 4652 2176 dllhost.exe 110 PID 2176 wrote to memory of 2484 2176 dllhost.exe 93 PID 2176 wrote to memory of 2484 2176 dllhost.exe 93 PID 2176 wrote to memory of 2484 2176 dllhost.exe 93 PID 2176 wrote to memory of 4500 2176 dllhost.exe 96 PID 2176 wrote to memory of 4500 2176 dllhost.exe 96 PID 2176 wrote to memory of 4500 2176 dllhost.exe 96 PID 2176 wrote to memory of 2352 2176 dllhost.exe 108 PID 2176 wrote to memory of 2352 2176 dllhost.exe 108 PID 2176 wrote to memory of 2352 2176 dllhost.exe 108 PID 2176 wrote to memory of 3768 2176 dllhost.exe 106 PID 2176 wrote to memory of 3768 2176 dllhost.exe 106 PID 2176 wrote to memory of 3768 2176 dllhost.exe 106 PID 2176 wrote to memory of 1600 2176 dllhost.exe 97 PID 2176 wrote to memory of 1600 2176 dllhost.exe 97 PID 2176 wrote to memory of 1600 2176 dllhost.exe 97 PID 2176 wrote to memory of 1244 2176 dllhost.exe 101 PID 2176 wrote to memory of 1244 2176 dllhost.exe 101 PID 2176 wrote to memory of 1244 2176 dllhost.exe 101 PID 2176 wrote to memory of 4604 2176 dllhost.exe 100 PID 2176 wrote to memory of 4604 2176 dllhost.exe 100 PID 2176 wrote to memory of 4604 2176 dllhost.exe 100 PID 2176 wrote to memory of 896 2176 dllhost.exe 102 PID 2176 wrote to memory of 896 2176 dllhost.exe 102 PID 2176 wrote to memory of 896 2176 dllhost.exe 102 PID 2176 wrote to memory of 1156 2176 dllhost.exe 112 PID 2176 wrote to memory of 1156 2176 dllhost.exe 112 PID 2176 wrote to memory of 1156 2176 dllhost.exe 112 PID 2176 wrote to memory of 4104 2176 dllhost.exe 113 PID 2176 wrote to memory of 4104 2176 dllhost.exe 113 PID 2176 wrote to memory of 4104 2176 dllhost.exe 113 PID 1600 wrote to memory of 4608 1600 cmd.exe 118 PID 1600 wrote to memory of 4608 1600 cmd.exe 118 PID 1600 wrote to memory of 4608 1600 cmd.exe 118 PID 4104 wrote to memory of 2380 4104 cmd.exe 119 PID 4104 wrote to memory of 2380 4104 cmd.exe 119 PID 4104 wrote to memory of 2380 4104 cmd.exe 119 PID 2484 wrote to memory of 2540 2484 cmd.exe 117 PID 2484 wrote to memory of 2540 2484 cmd.exe 117 PID 2484 wrote to memory of 2540 2484 cmd.exe 117 PID 4604 wrote to memory of 3260 4604 cmd.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ea83af5875395e4c089df103ddbb9022fd6670fb749ecacfcf53456b9f8cf78.exe"C:\Users\Admin\AppData\Local\Temp\9ea83af5875395e4c089df103ddbb9022fd6670fb749ecacfcf53456b9f8cf78.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:3232
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3476
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:444
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2540
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4500
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2520
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4608
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2072" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2072" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3260
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1244
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2340
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk4126" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:896
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk4126" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:780
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3768
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4268
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2352
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4652
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3280
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4636
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3068
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk7121" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1156
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7487" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7487" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2380
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4672
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4152
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:1948
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4932
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:2920
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4232
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
900KB
MD5e4a39f7c06d7126f5b93cd375ac2ba3b
SHA1828d049169d09b152885970ccb154b07813298e3
SHA2569644af2c2521fe0b3890ceb26309a3c7489979e0c2d97e867a5ef7228e2c2647
SHA512953012021c6cfa6490d86dddbd8e65d9be93ff4803c61770e745a53066153ec235cba6317e63bf281b9b27b9744c16d9c1b62961b775291d08212e60860f93a3
-
Filesize
900KB
MD5e4a39f7c06d7126f5b93cd375ac2ba3b
SHA1828d049169d09b152885970ccb154b07813298e3
SHA2569644af2c2521fe0b3890ceb26309a3c7489979e0c2d97e867a5ef7228e2c2647
SHA512953012021c6cfa6490d86dddbd8e65d9be93ff4803c61770e745a53066153ec235cba6317e63bf281b9b27b9744c16d9c1b62961b775291d08212e60860f93a3
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD562785b0f831e54c4d08d68b297987729
SHA1c756973160038caa54514b298b0cc1857da3c467
SHA25684971a0904b2e799a71ed723f8d6311e498874a51b15bc1e23e8f060fa7a9110
SHA5122661c5622c1d6ad39f184e632f05ed39c56954df2e14217e60a2ba6e2fbcf1aecd5de9128d39002c8fff21b366d1c64191c91ea58155ecbf347aaec4a18bec34
-
Filesize
18KB
MD5657cf657366b4eaee2b9ccadc13cb463
SHA1f204b1b6b0cfc3f424750ad984fc935005c2569e
SHA256ee0d6aa8e04a5b0b72bdd286a7238f54ae80a124e9985b87025d2d8b73c39b55
SHA51271b164cdce258f098e4a5317ac68870e94f8b06f2d1a53f5a6824badbb2ba5ef24a63cf1fc206bb0089e744fa695bc94507bea771ca3f9f0660b5f645a2d0eb6