Analysis
-
max time kernel
92s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 20:50
Behavioral task
behavioral1
Sample
8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe
Resource
win10v2004-20220812-en
General
-
Target
8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe
-
Size
100KB
-
MD5
e52c395049d59efaf2515b0ed7f555c4
-
SHA1
0a765a7b624f6d84909320cdd4f9a083fa117833
-
SHA256
8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9
-
SHA512
e517592f85bb400e6f684987726e09d121b1f81fbe3ba42e78c7a1b94bb25d587e0044a7bdff2178f2c2bdce926733d9718c03e39ea9d706bca998c5f465b122
-
SSDEEP
3072:SBdUWd+EidEJTklav8i4zQsZlTNO6wsB+ovK7WKIRn34N6fvCX:SsWd+NdE4hZxsQB+iK7Ql34sHC
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000300000001da29-145.dat aspack_v212_v242 behavioral2/files/0x000300000001da29-146.dat aspack_v212_v242 -
Executes dropped EXE 3 IoCs
pid Process 4908 594C.exe 2296 C484.exe 1716 594C.exe -
Loads dropped DLL 3 IoCs
pid Process 4908 594C.exe 4908 594C.exe 1716 594C.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MSWINSCK.OCX 8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe File opened for modification C:\Windows\SysWOW64\594C.exe 8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe File opened for modification C:\Windows\SysWOW64\C484.exe 8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe File opened for modification C:\Windows\SysWOW64\594C.exe C484.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\ = "Microsoft WinSock Control, version 6.0" 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\ = "0" 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} 594C.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID\ = "MSWinsock.Winsock" 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Programmable 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ = "Microsoft WinSock Control, version 6.0" 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version\ = "1.0" 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX, 1" 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS\ = "2" 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D} 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID\ = "MSWinsock.Winsock.1" 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1\ = "132497" 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\ = "Winsock General Property Page Object" 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" 594C.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ = "IMSWinsockControl" 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\ = "Microsoft Winsock Control 6.0" 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 594C.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ThreadingModel = "Apartment" 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus 594C.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0 594C.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2500 8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe 4908 594C.exe 2296 C484.exe 1716 594C.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2500 wrote to memory of 3592 2500 8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe 81 PID 2500 wrote to memory of 3592 2500 8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe 81 PID 2500 wrote to memory of 3592 2500 8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe 81 PID 3592 wrote to memory of 4908 3592 cmd.exe 83 PID 3592 wrote to memory of 4908 3592 cmd.exe 83 PID 3592 wrote to memory of 4908 3592 cmd.exe 83 PID 2500 wrote to memory of 2296 2500 8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe 84 PID 2500 wrote to memory of 2296 2500 8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe 84 PID 2500 wrote to memory of 2296 2500 8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe 84 PID 2296 wrote to memory of 2252 2296 C484.exe 85 PID 2296 wrote to memory of 2252 2296 C484.exe 85 PID 2296 wrote to memory of 2252 2296 C484.exe 85 PID 2252 wrote to memory of 1716 2252 cmd.exe 87 PID 2252 wrote to memory of 1716 2252 cmd.exe 87 PID 2252 wrote to memory of 1716 2252 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe"C:\Users\Admin\AppData\Local\Temp\8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\594C.exe eee2⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\594C.exeC:\Windows\system32\594C.exe eee3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4908
-
-
-
C:\Windows\SysWOW64\C484.exeC:\Windows\system32\C484.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\594C.exe eee3⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\594C.exeC:\Windows\system32\594C.exe eee4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1716
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
354KB
MD5f774d1b0ee0783b7a6617597219101b5
SHA1f89b631e765139b7821475f181ff5a2f310a2e13
SHA256e39bb0e35b90c993aefdb013e8924243d4a0430623b1a00464da12085a1a4198
SHA512c949fef9b0eeaa45d74501849ebb1bfaf4b54a3da873837c9aa8dae9e1e8d89c89d0c71fd3743ea1f0de852beff28f44c4fea9a0d51ffb4e9914fc49ca6181cf
-
Filesize
108KB
MD58cfd59ac42287fd6ceb2ca03a0eeab23
SHA19d4f662f093093acb151dda39e2bcbc5dac8bdc9
SHA256bbafeae609d14f173e3b11715a32e626d73651c4d193772b19df62dc551f8fcb
SHA5128433452fb3dd4b87915efd1fffa1643010c786d28bab38ca2ac6e99e66d9f1cf5585ebc0d05aa77549011505aa8e0ad83acfadd954c225aef23da2bed3c19485
-
Filesize
108KB
MD58cfd59ac42287fd6ceb2ca03a0eeab23
SHA19d4f662f093093acb151dda39e2bcbc5dac8bdc9
SHA256bbafeae609d14f173e3b11715a32e626d73651c4d193772b19df62dc551f8fcb
SHA5128433452fb3dd4b87915efd1fffa1643010c786d28bab38ca2ac6e99e66d9f1cf5585ebc0d05aa77549011505aa8e0ad83acfadd954c225aef23da2bed3c19485
-
Filesize
108KB
MD58cfd59ac42287fd6ceb2ca03a0eeab23
SHA19d4f662f093093acb151dda39e2bcbc5dac8bdc9
SHA256bbafeae609d14f173e3b11715a32e626d73651c4d193772b19df62dc551f8fcb
SHA5128433452fb3dd4b87915efd1fffa1643010c786d28bab38ca2ac6e99e66d9f1cf5585ebc0d05aa77549011505aa8e0ad83acfadd954c225aef23da2bed3c19485
-
Filesize
100KB
MD5e52c395049d59efaf2515b0ed7f555c4
SHA10a765a7b624f6d84909320cdd4f9a083fa117833
SHA2568f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9
SHA512e517592f85bb400e6f684987726e09d121b1f81fbe3ba42e78c7a1b94bb25d587e0044a7bdff2178f2c2bdce926733d9718c03e39ea9d706bca998c5f465b122
-
Filesize
100KB
MD5e52c395049d59efaf2515b0ed7f555c4
SHA10a765a7b624f6d84909320cdd4f9a083fa117833
SHA2568f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9
SHA512e517592f85bb400e6f684987726e09d121b1f81fbe3ba42e78c7a1b94bb25d587e0044a7bdff2178f2c2bdce926733d9718c03e39ea9d706bca998c5f465b122
-
Filesize
105KB
MD59484c04258830aa3c2f2a70eb041414c
SHA1b242a4fb0e9dcf14cb51dc36027baff9a79cb823
SHA256bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5
SHA5129d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0
-
Filesize
105KB
MD59484c04258830aa3c2f2a70eb041414c
SHA1b242a4fb0e9dcf14cb51dc36027baff9a79cb823
SHA256bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5
SHA5129d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0
-
Filesize
105KB
MD59484c04258830aa3c2f2a70eb041414c
SHA1b242a4fb0e9dcf14cb51dc36027baff9a79cb823
SHA256bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5
SHA5129d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0
-
Filesize
105KB
MD59484c04258830aa3c2f2a70eb041414c
SHA1b242a4fb0e9dcf14cb51dc36027baff9a79cb823
SHA256bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5
SHA5129d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0