Analysis
-
max time kernel
110s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 04:30
Behavioral task
behavioral1
Sample
09e82a1fcc50c27f45f30179d269fb28868089e813a4a242f520a9c3314f6f35.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
09e82a1fcc50c27f45f30179d269fb28868089e813a4a242f520a9c3314f6f35.exe
Resource
win10v2004-20220812-en
General
-
Target
09e82a1fcc50c27f45f30179d269fb28868089e813a4a242f520a9c3314f6f35.exe
-
Size
70KB
-
MD5
4a1e72a39edbc4e0c91c93309d09d3f0
-
SHA1
d48ee7c3628af51c5136d29360d09258e6f2cade
-
SHA256
09e82a1fcc50c27f45f30179d269fb28868089e813a4a242f520a9c3314f6f35
-
SHA512
56bd82d1ee5cff6f8988b0066562cc4ee7974a93087e5862baacb5056b441686888b156234ab0e6040fede51f24423b11565aa090d211d1d3c94aeabf3009a4c
-
SSDEEP
1536:tx2sS4pN9WmCNWseZxJITPAungOzp+edWTgLrpp:tx2snsNWseDuTxngwUY
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0009000000022f50-134.dat aspack_v212_v242 behavioral2/files/0x0009000000022f50-135.dat aspack_v212_v242 behavioral2/files/0x0006000000022f5b-138.dat aspack_v212_v242 behavioral2/files/0x0006000000022f5b-139.dat aspack_v212_v242 behavioral2/files/0x0006000000022f5c-143.dat aspack_v212_v242 behavioral2/files/0x0006000000022f5c-144.dat aspack_v212_v242 behavioral2/files/0x0006000000022f5d-148.dat aspack_v212_v242 behavioral2/files/0x0006000000022f5d-149.dat aspack_v212_v242 behavioral2/files/0x0006000000022f5e-153.dat aspack_v212_v242 behavioral2/files/0x0006000000022f5e-154.dat aspack_v212_v242 behavioral2/files/0x0006000000022f61-157.dat aspack_v212_v242 behavioral2/files/0x0006000000022f61-158.dat aspack_v212_v242 behavioral2/files/0x0006000000022f63-161.dat aspack_v212_v242 behavioral2/files/0x0006000000022f63-162.dat aspack_v212_v242 behavioral2/files/0x0008000000022f67-165.dat aspack_v212_v242 behavioral2/files/0x0008000000022f67-166.dat aspack_v212_v242 behavioral2/files/0x000e000000022f6a-169.dat aspack_v212_v242 behavioral2/files/0x000e000000022f6a-170.dat aspack_v212_v242 behavioral2/files/0x0006000000022f6e-173.dat aspack_v212_v242 behavioral2/files/0x0006000000022f6e-174.dat aspack_v212_v242 behavioral2/files/0x0006000000022f6f-177.dat aspack_v212_v242 behavioral2/files/0x0006000000022f6f-178.dat aspack_v212_v242 behavioral2/files/0x0006000000022f70-181.dat aspack_v212_v242 behavioral2/files/0x0006000000022f70-182.dat aspack_v212_v242 behavioral2/files/0x0006000000022f71-185.dat aspack_v212_v242 behavioral2/files/0x0006000000022f71-186.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1784 2784101b.exe -
Sets DLL path for service in the registry 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" 2784101b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCAudit\Parameters\ServiceDll = "C:\\Windows\\system32\\PCAudit.dll" 2784101b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\helpsvc\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" 2784101b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\uploadmgr\Parameters\ServiceDll = "C:\\Windows\\system32\\uploadmgr.dll" 2784101b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 2784101b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 2784101b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" 2784101b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" 2784101b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 2784101b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" 2784101b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" 2784101b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 2784101b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" 2784101b.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" 2784101b.exe -
resource yara_rule behavioral2/memory/1196-132-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/1196-147-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Loads dropped DLL 12 IoCs
pid Process 2340 svchost.exe 4048 svchost.exe 4584 svchost.exe 1312 svchost.exe 4544 svchost.exe 864 svchost.exe 2688 svchost.exe 1700 svchost.exe 4588 svchost.exe 4508 svchost.exe 1300 svchost.exe 4288 svchost.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ias.dll 2784101b.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll 2784101b.exe File opened for modification C:\Windows\SysWOW64\Nla.dll 2784101b.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll 2784101b.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll 2784101b.exe File opened for modification C:\Windows\SysWOW64\Wmi.dll 2784101b.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 2784101b.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll 2784101b.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll 2784101b.exe File opened for modification C:\Windows\SysWOW64\SRService.dll 2784101b.exe File opened for modification C:\Windows\SysWOW64\LogonHours.dll 2784101b.exe File opened for modification C:\Windows\SysWOW64\PCAudit.dll 2784101b.exe File opened for modification C:\Windows\SysWOW64\helpsvc.dll 2784101b.exe File opened for modification C:\Windows\SysWOW64\uploadmgr.dll 2784101b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1784 2784101b.exe 1784 2784101b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1784 1196 09e82a1fcc50c27f45f30179d269fb28868089e813a4a242f520a9c3314f6f35.exe 81 PID 1196 wrote to memory of 1784 1196 09e82a1fcc50c27f45f30179d269fb28868089e813a4a242f520a9c3314f6f35.exe 81 PID 1196 wrote to memory of 1784 1196 09e82a1fcc50c27f45f30179d269fb28868089e813a4a242f520a9c3314f6f35.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\09e82a1fcc50c27f45f30179d269fb28868089e813a4a242f520a9c3314f6f35.exe"C:\Users\Admin\AppData\Local\Temp\09e82a1fcc50c27f45f30179d269fb28868089e813a4a242f520a9c3314f6f35.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\2784101b.exeC:\2784101b.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
PID:2340
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon1⤵
- Loads dropped DLL
PID:4048
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla1⤵
- Loads dropped DLL
PID:4584
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc1⤵
- Loads dropped DLL
PID:1312
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation1⤵
- Loads dropped DLL
PID:4544
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent1⤵
- Loads dropped DLL
PID:864
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService1⤵
- Loads dropped DLL
PID:2688
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp1⤵
- Loads dropped DLL
PID:1700
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours1⤵
- Loads dropped DLL
PID:4588
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit1⤵
- Loads dropped DLL
PID:4508
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc1⤵
- Loads dropped DLL
PID:1300
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr1⤵
- Loads dropped DLL
PID:4288
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD52f5e717eb6b7704add134d7a72fad8a6
SHA1101392344b72bcb671b720e74df8831ba006a104
SHA256c25d6398bc1e9ff19b51ec3e1cbc0bc6ab6ae2697ea06cb92fe5cccf4d37acb9
SHA512b40ab81cba822dba9cce9db77841bf3fbd1ae193d05b3efd3edc8e1f0b80093ced2b66d7d82b33e8eb06c941f05d23af968c976daa05295c15948aab9e1ab9d7
-
Filesize
56KB
MD52f5e717eb6b7704add134d7a72fad8a6
SHA1101392344b72bcb671b720e74df8831ba006a104
SHA256c25d6398bc1e9ff19b51ec3e1cbc0bc6ab6ae2697ea06cb92fe5cccf4d37acb9
SHA512b40ab81cba822dba9cce9db77841bf3fbd1ae193d05b3efd3edc8e1f0b80093ced2b66d7d82b33e8eb06c941f05d23af968c976daa05295c15948aab9e1ab9d7
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0
-
Filesize
56KB
MD5db5f7d0790d99e4fb616c6d757a0bf92
SHA12a8377639519093d57eb7febf91567b0f891d0fb
SHA2561b0761634c85914c8ddbc306260444fe3ec977051b2560dde44659fec2b0e1af
SHA5123dcc07f7f0a0b92762d77473fbd817e566d05dc8b035888d99e663d83935d75827abd171ae25314786307c2a4a2fc204ce492f995ff5ea786b4ebda4fd4b0ca0