Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 04:32
Static task
static1
Behavioral task
behavioral1
Sample
4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe
Resource
win10v2004-20220901-en
General
-
Target
4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe
-
Size
164KB
-
MD5
ead30fb1cc8bf40ba3a64aac48d8113f
-
SHA1
a9eeb4fc73e9bdc87402330f5a7426675004bbd4
-
SHA256
4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449
-
SHA512
41092adf253dfe3b7d456ecd501524c1b3a6fcf8d5e22a79a7d634659a0fa35235bdb620d0349b47e476be5950a044997ac7f9f23dca7674e7dde54701944985
-
SSDEEP
3072:fG1TRtydMn84E4rmE6lBx8p6H++a3s4ElwJz/H2g9XmLGJvr1lZqHRVItGpDxL:fG1FVn84Vm+6+ElkuOXIGRrbZoVItM
Malware Config
Signatures
-
Executes dropped EXE 12 IoCs
pid Process 1328 zz20.exe 3824 zz20.exe 3452 zz20.exe 2872 zz20.exe 3460 zz20.exe 4792 zz20.exe 3396 zz20.exe 3592 zz20.exe 4276 zz20.exe 4772 Foto.exe 1892 svchost.exe 404 p1.exe -
resource yara_rule behavioral2/files/0x0003000000022e1c-168.dat upx behavioral2/files/0x0003000000022e1c-169.dat upx behavioral2/memory/1892-170-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1892-174-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Foto.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UpData = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\" -hide" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 388 wrote to memory of 1328 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 84 PID 388 wrote to memory of 1328 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 84 PID 388 wrote to memory of 1328 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 84 PID 388 wrote to memory of 3824 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 85 PID 388 wrote to memory of 3824 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 85 PID 388 wrote to memory of 3824 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 85 PID 388 wrote to memory of 3452 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 89 PID 388 wrote to memory of 3452 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 89 PID 388 wrote to memory of 3452 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 89 PID 388 wrote to memory of 2872 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 91 PID 388 wrote to memory of 2872 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 91 PID 388 wrote to memory of 2872 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 91 PID 388 wrote to memory of 3460 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 94 PID 388 wrote to memory of 3460 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 94 PID 388 wrote to memory of 3460 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 94 PID 388 wrote to memory of 3524 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 96 PID 388 wrote to memory of 3524 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 96 PID 388 wrote to memory of 3524 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 96 PID 3524 wrote to memory of 4088 3524 cmd.exe 98 PID 3524 wrote to memory of 4088 3524 cmd.exe 98 PID 3524 wrote to memory of 4088 3524 cmd.exe 98 PID 3524 wrote to memory of 2992 3524 cmd.exe 100 PID 3524 wrote to memory of 2992 3524 cmd.exe 100 PID 3524 wrote to memory of 2992 3524 cmd.exe 100 PID 3524 wrote to memory of 3008 3524 cmd.exe 101 PID 3524 wrote to memory of 3008 3524 cmd.exe 101 PID 3524 wrote to memory of 3008 3524 cmd.exe 101 PID 4088 wrote to memory of 1756 4088 cmd.exe 104 PID 4088 wrote to memory of 1756 4088 cmd.exe 104 PID 4088 wrote to memory of 1756 4088 cmd.exe 104 PID 2992 wrote to memory of 4272 2992 cmd.exe 106 PID 2992 wrote to memory of 4272 2992 cmd.exe 106 PID 2992 wrote to memory of 4272 2992 cmd.exe 106 PID 1756 wrote to memory of 2028 1756 net.exe 107 PID 1756 wrote to memory of 2028 1756 net.exe 107 PID 1756 wrote to memory of 2028 1756 net.exe 107 PID 3008 wrote to memory of 3972 3008 cmd.exe 105 PID 3008 wrote to memory of 3972 3008 cmd.exe 105 PID 3008 wrote to memory of 3972 3008 cmd.exe 105 PID 4272 wrote to memory of 3748 4272 net.exe 109 PID 4272 wrote to memory of 3748 4272 net.exe 109 PID 4272 wrote to memory of 3748 4272 net.exe 109 PID 3972 wrote to memory of 3148 3972 net.exe 108 PID 3972 wrote to memory of 3148 3972 net.exe 108 PID 3972 wrote to memory of 3148 3972 net.exe 108 PID 388 wrote to memory of 4792 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 110 PID 388 wrote to memory of 4792 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 110 PID 388 wrote to memory of 4792 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 110 PID 388 wrote to memory of 3396 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 112 PID 388 wrote to memory of 3396 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 112 PID 388 wrote to memory of 3396 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 112 PID 388 wrote to memory of 1180 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 113 PID 388 wrote to memory of 1180 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 113 PID 388 wrote to memory of 1180 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 113 PID 388 wrote to memory of 3592 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 115 PID 388 wrote to memory of 3592 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 115 PID 388 wrote to memory of 3592 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 115 PID 388 wrote to memory of 4276 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 118 PID 388 wrote to memory of 4276 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 118 PID 388 wrote to memory of 4276 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 118 PID 388 wrote to memory of 4772 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 123 PID 388 wrote to memory of 4772 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 123 PID 388 wrote to memory of 4772 388 4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe 123 PID 4772 wrote to memory of 1892 4772 Foto.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe"C:\Users\Admin\AppData\Local\Temp\4c85a77fa1fc596cb40a295eb21ad1f27d405419a7d1d1e5f738ba0b3c36a449.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"2⤵
- Executes dropped EXE
PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"2⤵
- Executes dropped EXE
PID:3824
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"2⤵
- Executes dropped EXE
PID:3452
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"2⤵
- Executes dropped EXE
PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"2⤵
- Executes dropped EXE
PID:3460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\windows1.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\cmd.execmd /c net stop antivirService3⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\net.exenet stop antivirService4⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop antivirService5⤵PID:2028
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop windefend3⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\net.exenet stop windefend4⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop windefend5⤵PID:3748
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop sp_rssrv3⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\net.exenet stop sp_rssrv4⤵
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sp_rssrv5⤵PID:3148
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"2⤵
- Executes dropped EXE
PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"2⤵
- Executes dropped EXE
PID:3396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\windows3.bat" "2⤵PID:1180
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"2⤵
- Executes dropped EXE
PID:3592
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\zz20.exe"2⤵
- Executes dropped EXE
PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Foto.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Foto.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\p1.exe"C:\Users\Admin\AppData\Local\Temp\p1.exe"4⤵
- Executes dropped EXE
PID:404
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD527b18d0e70d372e955f23b4a87bd8f89
SHA1c77837401147ea45ca7033290a22c306eeb5d4a0
SHA2565a1a28f3b7aaa943038cea32551d7c0dc506c2d37c79e26c120e80bdb8a4bedb
SHA5120dada74d1661c5b1ccbdbb13ecec253ab0753ac719728472b35c305710f381c0864a3e5bbabe184e6de52cc88d54fadb437e72ce769b5d7bfb0c2352f6c0e254
-
Filesize
95KB
MD527b18d0e70d372e955f23b4a87bd8f89
SHA1c77837401147ea45ca7033290a22c306eeb5d4a0
SHA2565a1a28f3b7aaa943038cea32551d7c0dc506c2d37c79e26c120e80bdb8a4bedb
SHA5120dada74d1661c5b1ccbdbb13ecec253ab0753ac719728472b35c305710f381c0864a3e5bbabe184e6de52cc88d54fadb437e72ce769b5d7bfb0c2352f6c0e254
-
Filesize
151B
MD5e2e58527f7455f3a7c0853d73df5e3fe
SHA13b48ec55e55b0401d79d8a698571e069bfae462b
SHA2563ab6d816e12ecc256c7cc98fb301dfe7ec74a01764f0f8f3591e2b035193ee0a
SHA512e59a50f1ac5a5e92a736397a795e6d851a7ff988f0698bc90137aafec8db9b7d9a2db111b355db32204ce6d57cb902ee5bf8f90664e093b47a45f43186d66ca2
-
Filesize
280B
MD52df377e552d0180ffbb0168c88ec51be
SHA152e604fe3b461de67030a6a55141548eb15cfaae
SHA256b5c790d942740783f254d62fb6f4dea1e8182b535462f99f271892ceab114ac3
SHA5125252917c984551c6270a062f6ed0df18094858f64728b45cb575fdc84a6ad10395f20ad64fc51dc83d9ce96bca5ea100eda60643a0c82d286f80a27e3606eaa6
-
Filesize
2KB
MD5763f02a065bd4a5d810445919434e292
SHA180806ac05ddb0f7796aebf5062ae13e2295dc728
SHA256e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd
SHA5123e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12
-
Filesize
2KB
MD5763f02a065bd4a5d810445919434e292
SHA180806ac05ddb0f7796aebf5062ae13e2295dc728
SHA256e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd
SHA5123e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12
-
Filesize
2KB
MD5763f02a065bd4a5d810445919434e292
SHA180806ac05ddb0f7796aebf5062ae13e2295dc728
SHA256e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd
SHA5123e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12
-
Filesize
2KB
MD5763f02a065bd4a5d810445919434e292
SHA180806ac05ddb0f7796aebf5062ae13e2295dc728
SHA256e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd
SHA5123e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12
-
Filesize
2KB
MD5763f02a065bd4a5d810445919434e292
SHA180806ac05ddb0f7796aebf5062ae13e2295dc728
SHA256e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd
SHA5123e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12
-
Filesize
2KB
MD5763f02a065bd4a5d810445919434e292
SHA180806ac05ddb0f7796aebf5062ae13e2295dc728
SHA256e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd
SHA5123e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12
-
Filesize
2KB
MD5763f02a065bd4a5d810445919434e292
SHA180806ac05ddb0f7796aebf5062ae13e2295dc728
SHA256e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd
SHA5123e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12
-
Filesize
2KB
MD5763f02a065bd4a5d810445919434e292
SHA180806ac05ddb0f7796aebf5062ae13e2295dc728
SHA256e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd
SHA5123e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12
-
Filesize
2KB
MD5763f02a065bd4a5d810445919434e292
SHA180806ac05ddb0f7796aebf5062ae13e2295dc728
SHA256e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd
SHA5123e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12
-
Filesize
2KB
MD5763f02a065bd4a5d810445919434e292
SHA180806ac05ddb0f7796aebf5062ae13e2295dc728
SHA256e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd
SHA5123e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12
-
Filesize
2KB
MD5763f02a065bd4a5d810445919434e292
SHA180806ac05ddb0f7796aebf5062ae13e2295dc728
SHA256e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd
SHA5123e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12
-
Filesize
2KB
MD5763f02a065bd4a5d810445919434e292
SHA180806ac05ddb0f7796aebf5062ae13e2295dc728
SHA256e5d818a711543558d34c656631043ac370a4864db639127476a69e02773d80bd
SHA5123e6ef396ff0660d857acbc14bcb152be79302f8e0d49fa829703f066310f979412e4039443530be390d0990898dd76c7ce55eed4615ac757dbe5521428f35b12
-
Filesize
71KB
MD5e01fb44ef9aa08831c08d72cbd64049d
SHA1b92b189790dc42f2903f0b81ba979ed638de97de
SHA256d449441f97cb903bb30748e394bf50c26e3d2922477bfcfa2af65f313044968c
SHA512fb3df413260533a285994ed2a39d2ff42c214e518902955f09460d6feaca310c4fe4e24e7ff87d2e344f156fbe8d8cb63edc105083b32d14fff025a53a5690e4
-
Filesize
71KB
MD5e01fb44ef9aa08831c08d72cbd64049d
SHA1b92b189790dc42f2903f0b81ba979ed638de97de
SHA256d449441f97cb903bb30748e394bf50c26e3d2922477bfcfa2af65f313044968c
SHA512fb3df413260533a285994ed2a39d2ff42c214e518902955f09460d6feaca310c4fe4e24e7ff87d2e344f156fbe8d8cb63edc105083b32d14fff025a53a5690e4