Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 03:47
Static task
static1
Behavioral task
behavioral1
Sample
9ae063aad76bfd3f8ee64c781f67db4ce8e01d982130c1854d51e9fbf7100d10.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9ae063aad76bfd3f8ee64c781f67db4ce8e01d982130c1854d51e9fbf7100d10.exe
Resource
win10v2004-20220812-en
General
-
Target
9ae063aad76bfd3f8ee64c781f67db4ce8e01d982130c1854d51e9fbf7100d10.exe
-
Size
172KB
-
MD5
213c1a4d0c12a45713b91b187bdc2f54
-
SHA1
a7dfa3a391b4cbeff7021341f99534b8f176b0b2
-
SHA256
9ae063aad76bfd3f8ee64c781f67db4ce8e01d982130c1854d51e9fbf7100d10
-
SHA512
0076ff501eecc4b1a37fb4f6a14d30d0086246afd1ed2f20e4c926c668b048d1ff8afbf4223b1eaa2969527af8ef474741c75e85c290e0375d56a8d6562a86e4
-
SSDEEP
3072:6cFonoVD8oSx/mvXAFIFR7Nzim04f1fhLOG7GQiCLMt8Xt/Wv6mgeB:6GoUD8oSx/mvXAFIFR7N7DfhhLOG7GQe
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" saiofa.exe -
Executes dropped EXE 1 IoCs
pid Process 2012 saiofa.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 9ae063aad76bfd3f8ee64c781f67db4ce8e01d982130c1854d51e9fbf7100d10.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /m" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /t" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /w" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /W" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /n" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /I" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /F" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /A" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /z" saiofa.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /L" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /H" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /v" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /e" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /U" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /P" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /h" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /S" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /T" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /k" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /V" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /r" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /c" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /d" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /g" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /J" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /i" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /l" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /Y" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /p" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /f" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /a" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /Z" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /Q" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /K" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /B" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /R" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /E" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /u" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /D" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /G" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /j" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /O" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /X" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /s" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /q" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /o" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /y" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /N" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /C" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /b" saiofa.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\saiofa = "C:\\Users\\Admin\\saiofa.exe /x" saiofa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe 2012 saiofa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5012 9ae063aad76bfd3f8ee64c781f67db4ce8e01d982130c1854d51e9fbf7100d10.exe 2012 saiofa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5012 wrote to memory of 2012 5012 9ae063aad76bfd3f8ee64c781f67db4ce8e01d982130c1854d51e9fbf7100d10.exe 84 PID 5012 wrote to memory of 2012 5012 9ae063aad76bfd3f8ee64c781f67db4ce8e01d982130c1854d51e9fbf7100d10.exe 84 PID 5012 wrote to memory of 2012 5012 9ae063aad76bfd3f8ee64c781f67db4ce8e01d982130c1854d51e9fbf7100d10.exe 84 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79 PID 2012 wrote to memory of 5012 2012 saiofa.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ae063aad76bfd3f8ee64c781f67db4ce8e01d982130c1854d51e9fbf7100d10.exe"C:\Users\Admin\AppData\Local\Temp\9ae063aad76bfd3f8ee64c781f67db4ce8e01d982130c1854d51e9fbf7100d10.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\saiofa.exe"C:\Users\Admin\saiofa.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD50603d21f012cfc23e569c71d324034e8
SHA15015650c71c5e34a354b68b8b05386a89d2b8eaa
SHA2560a1a8f844c6fe9a0932c940449ca316add075c72a7f33137220f2f105df899d4
SHA5123ad926927126da4d6a5b96c9a30f178e2927ea5376fa69d9d038f05d2bd6d6d00151aa8d844c4d9c7d3f8095186f4044503eadeebbdee9ff6724da06db9f9538
-
Filesize
172KB
MD50603d21f012cfc23e569c71d324034e8
SHA15015650c71c5e34a354b68b8b05386a89d2b8eaa
SHA2560a1a8f844c6fe9a0932c940449ca316add075c72a7f33137220f2f105df899d4
SHA5123ad926927126da4d6a5b96c9a30f178e2927ea5376fa69d9d038f05d2bd6d6d00151aa8d844c4d9c7d3f8095186f4044503eadeebbdee9ff6724da06db9f9538