Analysis
-
max time kernel
190s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 17:00
Static task
static1
Behavioral task
behavioral1
Sample
96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe
Resource
win10v2004-20220812-en
General
-
Target
96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe
-
Size
662KB
-
MD5
d42a68673a0159cf44884e5f8d0dc0f3
-
SHA1
c673c7283f9590b57e4107f4092bb7d6bc3dbd84
-
SHA256
96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2
-
SHA512
cacea8e9a16fc57d40aaa56f4951cd137e6300de50f03ffeacac259f92c3d10da68050d7b87b10af92e530d0788b748272a9e947b15123556494b6b7d29cb4e2
-
SSDEEP
12288:Z0L+fPVW03VATD5MNEbevxuV0N6WqbzLNYQsh2yqlAyN1llV:6AEvUEbtVQ6W/QV
Malware Config
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Executes dropped EXE 1 IoCs
pid Process 4560 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy -
Loads dropped DLL 2 IoCs
pid Process 4560 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy 4560 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\IESettingSync 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4052 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe 4052 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe 4560 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy 4560 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy 3568 msedge.exe 3568 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4052 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe 4052 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe 4052 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe 4052 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe 4560 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy 4560 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy 4560 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy 4560 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4052 wrote to memory of 4560 4052 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe 82 PID 4052 wrote to memory of 4560 4052 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe 82 PID 4052 wrote to memory of 4560 4052 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe 82 PID 4560 wrote to memory of 3528 4560 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy 89 PID 4560 wrote to memory of 3528 4560 96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy 89 PID 3528 wrote to memory of 2272 3528 msedge.exe 90 PID 3528 wrote to memory of 2272 3528 msedge.exe 90 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 1408 3528 msedge.exe 93 PID 3528 wrote to memory of 3568 3528 msedge.exe 94 PID 3528 wrote to memory of 3568 3528 msedge.exe 94 PID 3528 wrote to memory of 2724 3528 msedge.exe 96 PID 3528 wrote to memory of 2724 3528 msedge.exe 96 PID 3528 wrote to memory of 2724 3528 msedge.exe 96 PID 3528 wrote to memory of 2724 3528 msedge.exe 96 PID 3528 wrote to memory of 2724 3528 msedge.exe 96 PID 3528 wrote to memory of 2724 3528 msedge.exe 96 PID 3528 wrote to memory of 2724 3528 msedge.exe 96 PID 3528 wrote to memory of 2724 3528 msedge.exe 96 PID 3528 wrote to memory of 2724 3528 msedge.exe 96 PID 3528 wrote to memory of 2724 3528 msedge.exe 96 PID 3528 wrote to memory of 2724 3528 msedge.exe 96 PID 3528 wrote to memory of 2724 3528 msedge.exe 96 PID 3528 wrote to memory of 2724 3528 msedge.exe 96 PID 3528 wrote to memory of 2724 3528 msedge.exe 96 PID 3528 wrote to memory of 2724 3528 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe"C:\Users\Admin\AppData\Local\Temp\96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmyC:\Users\Admin\AppData\Local\Temp\96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.tocabala.com/thread-250-1-1.html3⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa021d46f8,0x7ffa021d4708,0x7ffa021d47184⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,12826745912181679802,289353264038021931,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:24⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,12826745912181679802,289353264038021931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,12826745912181679802,289353264038021931,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2064 /prefetch:84⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12826745912181679802,289353264038021931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:14⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12826745912181679802,289353264038021931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:14⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2084,12826745912181679802,289353264038021931,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4872 /prefetch:84⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2084,12826745912181679802,289353264038021931,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5424 /prefetch:84⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12826745912181679802,289353264038021931,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:14⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12826745912181679802,289353264038021931,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:14⤵PID:4248
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1276
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_34D61B4A2A4AE0D3DDAB879224BCA77B
Filesize2KB
MD5b34fcfd4bd3059952c10ff9b1e8f0bde
SHA168ee422bb74f0255a85b697d45f7bff3cdcf3c0c
SHA25679589da398956346f56741a87045e117c240e8f1641a901f9163291a483a7973
SHA5122cde60d891de4134a916f828b71b54956ef37c8aca503ffa363b4e80d5818472412db0f87cfdf654724f05be52b7db203e9c685844b3a1446459a8d556344185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD50698dbc93ba7b6bef73ba316695f8317
SHA1a444078ff1eb7c88f52cb4e324365926b491ed47
SHA256263292040d77903899257c1d21201dc64d6f8d6b5a1d945cd5b28d0124d7906c
SHA512ebacaa7009aebb88199cd70fd0bb3afe69ed300318cb633edd1c0404e42aef829617f589bcbad6cb7ab4bd0a8ae87f7df1435c786184ecc5de61c8fc6950a900
-
Filesize
728B
MD52c6d5d373c91fc4cb18958e7d1c8141c
SHA1ca394947c161fde6f50edf2fc0792c9d9f00e58d
SHA2568bcea716eff0b86bbe298894116497e6187e6f9da883a7b019341875be5d792b
SHA512820b4d6986b4433d8daa2c62e71894d2144ed8c0c43d61fbbd360df11fc0b0ec6a93e0d82d6434f21467315b52ca326fed75c6e66d4be5d68465a2c478041686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_34D61B4A2A4AE0D3DDAB879224BCA77B
Filesize488B
MD57517f5ba8154dd5e0651a39aabae0591
SHA12407729f307106d2a0af2e6581a4c3b7e32dd748
SHA256bfd4586a121027444cc0d7ebba4e9bde8afe546716e53ed22a443493d283166c
SHA5122ad0c00f4a7d05b005d9e7b4a4b1c5c5145f289897c85f2da0bb088f846b16525dca0fe10a13dd6f891e2556e89294622b41fea3ed09c591d7fe5698a40e881d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD579593f2c0e3f0bf59fd14fe783407791
SHA1d325cce9f206a76f7dbac3f934137c9e00c01ee7
SHA256dc3d824810e9798f58a6978158de56e753c515f7128f2c9610f1915f58897efc
SHA512b903b02570d0b5121b02290ba11b82ad5348e89dfb257aff2149660b824da7d2a9ccc6783af5ba58d11284faa766858fb26d25296fc513a604329ccd0a192215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5B1F6CF4A47750C9CA624A892D7823E
Filesize504B
MD5b2aadb16390f4e9ca707a596d489d022
SHA1342db0ba2b2c1272c729e700b3780b7017e669a8
SHA256114092dec8842e9db6633774c4224729e5b936a4e5a27250b84ef1a923d40895
SHA512aee347f974996c43d97beb723c0df24c3c6ba62a50ebba7b15a39880ca3c66b0cf7dc6fdddcfe03d583f15bfb57a5b436be77a52b4a500acbfb1d1816d60215b
-
C:\Users\Admin\AppData\Local\Temp\96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy
Filesize662KB
MD5d42a68673a0159cf44884e5f8d0dc0f3
SHA1c673c7283f9590b57e4107f4092bb7d6bc3dbd84
SHA25696d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2
SHA512cacea8e9a16fc57d40aaa56f4951cd137e6300de50f03ffeacac259f92c3d10da68050d7b87b10af92e530d0788b748272a9e947b15123556494b6b7d29cb4e2
-
C:\Users\Admin\AppData\Local\Temp\96d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2.dmy
Filesize662KB
MD5d42a68673a0159cf44884e5f8d0dc0f3
SHA1c673c7283f9590b57e4107f4092bb7d6bc3dbd84
SHA25696d540b005a73f325946caf663bcaa9019f1a87b5217333e0608a1aa79ed84c2
SHA512cacea8e9a16fc57d40aaa56f4951cd137e6300de50f03ffeacac259f92c3d10da68050d7b87b10af92e530d0788b748272a9e947b15123556494b6b7d29cb4e2
-
Filesize
453KB
MD56df0ed0afe162198116be68aba60e0c4
SHA1bd0ca25ff4e495717be7345933aaa90755e5a6ca
SHA25614172cccc2b24d7b490b6038c9493e64d5cab4afeee62014710dfad546eec9dc
SHA5126696ec1e2261e44e1259609f74e95c205165048d94e581f44b09b87fc70e89b2eaeecd09b7de9cb9735dab0b9d90dd4ff7b5ac07e4b5bd8e5f502e71bbfdb757
-
Filesize
453KB
MD56df0ed0afe162198116be68aba60e0c4
SHA1bd0ca25ff4e495717be7345933aaa90755e5a6ca
SHA25614172cccc2b24d7b490b6038c9493e64d5cab4afeee62014710dfad546eec9dc
SHA5126696ec1e2261e44e1259609f74e95c205165048d94e581f44b09b87fc70e89b2eaeecd09b7de9cb9735dab0b9d90dd4ff7b5ac07e4b5bd8e5f502e71bbfdb757