Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 23:54
Behavioral task
behavioral1
Sample
4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe
Resource
win10v2004-20220812-en
General
-
Target
4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe
-
Size
301KB
-
MD5
561064157ccb97bfa2de52d32ea3be80
-
SHA1
a96bb46b4b9aceeb7d79d106d515ff7a72b09c0e
-
SHA256
4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437
-
SHA512
141d286b4f01f6318cad70ea80cd92cf1b7aa6614cbc69a107fcfc96befb2eff06f0c3d8f673386e5e8277efe31f9e2f9302a9c481e517b5bc0ca3efc0f120d0
-
SSDEEP
6144:4EUXdLwtKDBcwkBYK5Tz77uCYXilJbg5O5/9W:4EQ5BoYK5/7+XST5l
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x00140000000054ab-58.dat aspack_v212_v242 behavioral1/files/0x00140000000054ab-61.dat aspack_v212_v242 behavioral1/memory/1704-64-0x0000000000300000-0x000000000034D000-memory.dmp aspack_v212_v242 behavioral1/memory/1704-65-0x0000000000300000-0x000000000034D000-memory.dmp aspack_v212_v242 behavioral1/files/0x000900000001232f-68.dat aspack_v212_v242 behavioral1/files/0x000900000001232f-67.dat aspack_v212_v242 behavioral1/files/0x000b00000001234c-75.dat aspack_v212_v242 behavioral1/files/0x000b00000001234c-76.dat aspack_v212_v242 behavioral1/files/0x00070000000126a2-82.dat aspack_v212_v242 behavioral1/files/0x00070000000126a2-83.dat aspack_v212_v242 behavioral1/files/0x00070000000126c9-88.dat aspack_v212_v242 behavioral1/files/0x00070000000126c9-89.dat aspack_v212_v242 behavioral1/files/0x00070000000126f1-94.dat aspack_v212_v242 behavioral1/files/0x00070000000126f1-95.dat aspack_v212_v242 behavioral1/files/0x0007000000012726-99.dat aspack_v212_v242 behavioral1/files/0x0007000000012726-100.dat aspack_v212_v242 behavioral1/files/0x0007000000012744-105.dat aspack_v212_v242 behavioral1/files/0x0007000000012744-106.dat aspack_v212_v242 behavioral1/files/0x0008000000012758-110.dat aspack_v212_v242 behavioral1/files/0x0008000000012758-111.dat aspack_v212_v242 behavioral1/files/0x000700000001311a-115.dat aspack_v212_v242 behavioral1/files/0x000700000001311a-116.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1704 16980d64.exe -
Sets DLL path for service in the registry 2 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" 16980d64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" 16980d64.exe -
resource yara_rule behavioral1/memory/1836-55-0x0000000000400000-0x000000000054F000-memory.dmp upx behavioral1/files/0x00140000000054ab-58.dat upx behavioral1/memory/1704-59-0x0000000000C20000-0x0000000000C6D000-memory.dmp upx behavioral1/files/0x00140000000054ab-61.dat upx behavioral1/memory/1704-63-0x0000000000C20000-0x0000000000C6D000-memory.dmp upx behavioral1/memory/1704-62-0x0000000000C20000-0x0000000000C6D000-memory.dmp upx behavioral1/memory/1704-64-0x0000000000300000-0x000000000034D000-memory.dmp upx behavioral1/memory/1704-65-0x0000000000300000-0x000000000034D000-memory.dmp upx behavioral1/files/0x000900000001232f-68.dat upx behavioral1/files/0x000900000001232f-67.dat upx behavioral1/memory/1504-70-0x00000000744A0000-0x00000000744ED000-memory.dmp upx behavioral1/memory/1504-71-0x00000000744A0000-0x00000000744ED000-memory.dmp upx behavioral1/memory/1504-72-0x00000000744A0000-0x00000000744ED000-memory.dmp upx behavioral1/memory/1836-73-0x0000000000400000-0x000000000054F000-memory.dmp upx behavioral1/files/0x000b00000001234c-75.dat upx behavioral1/files/0x000b00000001234c-76.dat upx behavioral1/memory/1152-79-0x0000000074B00000-0x0000000074B4D000-memory.dmp upx behavioral1/memory/1152-78-0x0000000074B00000-0x0000000074B4D000-memory.dmp upx behavioral1/memory/1152-80-0x0000000074B00000-0x0000000074B4D000-memory.dmp upx behavioral1/memory/1152-81-0x0000000074B00000-0x0000000074B4D000-memory.dmp upx behavioral1/files/0x00070000000126a2-82.dat upx behavioral1/files/0x00070000000126a2-83.dat upx behavioral1/memory/632-85-0x0000000074B60000-0x0000000074BAD000-memory.dmp upx behavioral1/memory/632-86-0x0000000074B60000-0x0000000074BAD000-memory.dmp upx behavioral1/memory/632-87-0x0000000074B60000-0x0000000074BAD000-memory.dmp upx behavioral1/files/0x00070000000126c9-88.dat upx behavioral1/files/0x00070000000126c9-89.dat upx behavioral1/memory/1176-91-0x0000000074B60000-0x0000000074BAD000-memory.dmp upx behavioral1/memory/1176-92-0x0000000074B60000-0x0000000074BAD000-memory.dmp upx behavioral1/memory/1176-93-0x0000000074B60000-0x0000000074BAD000-memory.dmp upx behavioral1/files/0x00070000000126f1-94.dat upx behavioral1/files/0x00070000000126f1-95.dat upx behavioral1/files/0x0007000000012726-99.dat upx behavioral1/files/0x0007000000012726-100.dat upx behavioral1/memory/384-102-0x0000000074B60000-0x0000000074BAD000-memory.dmp upx behavioral1/memory/384-103-0x0000000074B60000-0x0000000074BAD000-memory.dmp upx behavioral1/memory/384-104-0x0000000074B60000-0x0000000074BAD000-memory.dmp upx behavioral1/files/0x0007000000012744-105.dat upx behavioral1/files/0x0007000000012744-106.dat upx behavioral1/files/0x0008000000012758-110.dat upx behavioral1/files/0x0008000000012758-111.dat upx behavioral1/files/0x000700000001311a-115.dat upx behavioral1/files/0x000700000001311a-116.dat upx behavioral1/memory/1396-118-0x0000000074B60000-0x0000000074BAD000-memory.dmp upx behavioral1/memory/1396-119-0x0000000074B60000-0x0000000074BAD000-memory.dmp upx behavioral1/memory/1396-120-0x0000000074B60000-0x0000000074BAD000-memory.dmp upx -
Loads dropped DLL 9 IoCs
pid Process 1504 svchost.exe 1152 svchost.exe 632 svchost.exe 1176 svchost.exe 1064 svchost.exe 384 svchost.exe 1600 svchost.exe 1172 svchost.exe 1396 svchost.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Irmon.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\Wmi.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\Ias.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\SRService.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\LogonHours.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\Nla.dll 16980d64.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll 16980d64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1704 16980d64.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1836 wrote to memory of 1704 1836 4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe 28 PID 1836 wrote to memory of 1704 1836 4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe 28 PID 1836 wrote to memory of 1704 1836 4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe 28 PID 1836 wrote to memory of 1704 1836 4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe 28 PID 1836 wrote to memory of 1704 1836 4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe 28 PID 1836 wrote to memory of 1704 1836 4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe 28 PID 1836 wrote to memory of 1704 1836 4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe"C:\Users\Admin\AppData\Local\Temp\4be18d5a970d67e0f65ec1c9aa9b0dea670cf31d21b3e00eb12e04e5d6468437.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\16980d64.exeC:\16980d64.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1504
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵PID:568
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1152
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:632
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1176
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1064
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:384
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1600
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵PID:1580
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1172
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD5b0e56629b4f276273259f414ba362099
SHA1d5dfd49e47026877ca5d37d2bcc75a491cfc36ff
SHA256610f108dad9d94533144355db11bdf92752c8b19c576cf3a9e3913ad56b79bbe
SHA512e716f218d64940768ff8d979ea5d949f37719de8ad0a67296f432e3a440f743cbe254c5bed7f452ad972836c9a5799638b41c05e476cf7a58c4be9f27b9f2969
-
Filesize
237KB
MD5b0e56629b4f276273259f414ba362099
SHA1d5dfd49e47026877ca5d37d2bcc75a491cfc36ff
SHA256610f108dad9d94533144355db11bdf92752c8b19c576cf3a9e3913ad56b79bbe
SHA512e716f218d64940768ff8d979ea5d949f37719de8ad0a67296f432e3a440f743cbe254c5bed7f452ad972836c9a5799638b41c05e476cf7a58c4be9f27b9f2969
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e
-
Filesize
237KB
MD55a4545c1da4f53b2290cf1e8c72293da
SHA1818d89ea89134992499ffcc331b367d9bd0e7203
SHA256294f6d17cc43d03cf6e0503155d50c85e145e54642caa9f2790e301dc3e768d6
SHA5127fc4ac1f9fb257fa6c679a86eb37a3e6225955137e2f0c4f752fb369e1e5cdb15a686694f7e4e1b3a3718e81afcc630442349cf81a075a1a7dad3f10f4dd984e