Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2022 09:47
Static task
static1
Behavioral task
behavioral1
Sample
001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe
Resource
win10v2004-20220812-en
General
-
Target
001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe
-
Size
519KB
-
MD5
3655ea01660a35a03f33b064caff5079
-
SHA1
4dbb86e2b954106a3e7fec387039d8fbee49525d
-
SHA256
001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d
-
SHA512
398d28681fb149f164677e0cb0a08c331716f4799b7909fdab0dcdadd27b798d78d7c5abd1788b9f79140735f0a15d4a963a3719a75d4dfa6ac233ea0538284d
-
SSDEEP
12288:X1NyA4TV5nMEv2C0Ae+9kPv3vNEejphL7ELecctvU7QSP73M7bqPG:veTV5nMf+xAyej/L74oQX3MgG
Malware Config
Signatures
-
CryptoLocker
Ransomware family with multiple variants.
-
Executes dropped EXE 3 IoCs
pid Process 4968 {71257279-042b-371d-a1d3-fbf8d2fadffa}.exe 4940 {34184A33-0407-212E-3320-09040709E2C2}.exe 1432 {34184A33-0407-212E-3320-09040709E2C2}.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run {34184A33-0407-212E-3320-09040709E2C2}.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CryptoLocker = "C:\\Users\\Admin\\AppData\\Roaming\\{34184A33-0407-212E-3320-09040709E2C2}.exe" {34184A33-0407-212E-3320-09040709E2C2}.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4456 wrote to memory of 4968 4456 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe 83 PID 4456 wrote to memory of 4968 4456 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe 83 PID 4456 wrote to memory of 4968 4456 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe 83 PID 4456 wrote to memory of 4924 4456 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe 84 PID 4456 wrote to memory of 4924 4456 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe 84 PID 4456 wrote to memory of 4924 4456 001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe 84 PID 4968 wrote to memory of 4940 4968 {71257279-042b-371d-a1d3-fbf8d2fadffa}.exe 85 PID 4968 wrote to memory of 4940 4968 {71257279-042b-371d-a1d3-fbf8d2fadffa}.exe 85 PID 4968 wrote to memory of 4940 4968 {71257279-042b-371d-a1d3-fbf8d2fadffa}.exe 85 PID 4940 wrote to memory of 1432 4940 {34184A33-0407-212E-3320-09040709E2C2}.exe 86 PID 4940 wrote to memory of 1432 4940 {34184A33-0407-212E-3320-09040709E2C2}.exe 86 PID 4940 wrote to memory of 1432 4940 {34184A33-0407-212E-3320-09040709E2C2}.exe 86 PID 4924 wrote to memory of 2700 4924 AcroRd32.exe 87 PID 4924 wrote to memory of 2700 4924 AcroRd32.exe 87 PID 4924 wrote to memory of 2700 4924 AcroRd32.exe 87 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 4764 2700 RdrCEF.exe 88 PID 2700 wrote to memory of 2720 2700 RdrCEF.exe 89 PID 2700 wrote to memory of 2720 2700 RdrCEF.exe 89 PID 2700 wrote to memory of 2720 2700 RdrCEF.exe 89 PID 2700 wrote to memory of 2720 2700 RdrCEF.exe 89 PID 2700 wrote to memory of 2720 2700 RdrCEF.exe 89 PID 2700 wrote to memory of 2720 2700 RdrCEF.exe 89 PID 2700 wrote to memory of 2720 2700 RdrCEF.exe 89 PID 2700 wrote to memory of 2720 2700 RdrCEF.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe"C:\Users\Admin\AppData\Local\Temp\001b7a11497faa75fd8b490b03d99152ef9779606028a421b7760415da27ca5d.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\{71257279-042b-371d-a1d3-fbf8d2fadffa}.exe"C:\Users\Admin\AppData\Local\Temp\{71257279-042b-371d-a1d3-fbf8d2fadffa}.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\AppData\Local\Temp\{71257279-042b-371d-a1d3-fbf8d2fadffa}.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe"C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w0000021C4⤵
- Executes dropped EXE
PID:1432
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Email.pdf"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2142878A0147912B61B84E327A13A568 --mojo-platform-channel-handle=1736 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4764
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4F1949105B8DBBC27491C53C5A450407 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4F1949105B8DBBC27491C53C5A450407 --renderer-client-id=2 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job /prefetch:14⤵PID:2720
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E8E1ADC22F2810AAC38F1248902EF944 --mojo-platform-channel-handle=2156 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3972
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B0F903674ADDE1558DE99E48332A2BBC --mojo-platform-channel-handle=2168 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4652
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5B6AF5AAFA09BBD61D7915079D37C048 --mojo-platform-channel-handle=1848 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4020
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14B
MD541e86c2b6c58b19f23c528e49b0cccd3
SHA1151e373b7e9e7db55c51ef6e1576f7fc1945dd88
SHA2561f21a2b7f1ed54c31749d69eef98c317ab3ad4f6c5f8701b021c6fa04ea2f2f6
SHA512d75642888b27357f12a86352ba2593a91dcc72b6d9ede4f4d0b3420fa53f734176b0046edb6be8832c6a8f7d6fbf5f2dc97cc2ca578b28ae1d18190cb921258b
-
Filesize
336KB
MD513b25d5795762b82e30501f116ca736e
SHA1a80835acfcf8542765223357546cce2ad9a406ce
SHA25686f4fac36bc44b5accc435614bb8ad535ab815c0002925406e395bbbbe448930
SHA51200743d35ac8fd2af092d610aa27b691620bb415bb39f66b74ba4bb7dde5ffd32a4a79ad3cb4f4d263f79cd2c53a4152639c6763fa447da4ca2a08da30c528aba
-
Filesize
336KB
MD513b25d5795762b82e30501f116ca736e
SHA1a80835acfcf8542765223357546cce2ad9a406ce
SHA25686f4fac36bc44b5accc435614bb8ad535ab815c0002925406e395bbbbe448930
SHA51200743d35ac8fd2af092d610aa27b691620bb415bb39f66b74ba4bb7dde5ffd32a4a79ad3cb4f4d263f79cd2c53a4152639c6763fa447da4ca2a08da30c528aba
-
Filesize
336KB
MD513b25d5795762b82e30501f116ca736e
SHA1a80835acfcf8542765223357546cce2ad9a406ce
SHA25686f4fac36bc44b5accc435614bb8ad535ab815c0002925406e395bbbbe448930
SHA51200743d35ac8fd2af092d610aa27b691620bb415bb39f66b74ba4bb7dde5ffd32a4a79ad3cb4f4d263f79cd2c53a4152639c6763fa447da4ca2a08da30c528aba
-
Filesize
336KB
MD513b25d5795762b82e30501f116ca736e
SHA1a80835acfcf8542765223357546cce2ad9a406ce
SHA25686f4fac36bc44b5accc435614bb8ad535ab815c0002925406e395bbbbe448930
SHA51200743d35ac8fd2af092d610aa27b691620bb415bb39f66b74ba4bb7dde5ffd32a4a79ad3cb4f4d263f79cd2c53a4152639c6763fa447da4ca2a08da30c528aba
-
Filesize
336KB
MD513b25d5795762b82e30501f116ca736e
SHA1a80835acfcf8542765223357546cce2ad9a406ce
SHA25686f4fac36bc44b5accc435614bb8ad535ab815c0002925406e395bbbbe448930
SHA51200743d35ac8fd2af092d610aa27b691620bb415bb39f66b74ba4bb7dde5ffd32a4a79ad3cb4f4d263f79cd2c53a4152639c6763fa447da4ca2a08da30c528aba