Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22/11/2022, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe
Resource
win10v2004-20221111-en
General
-
Target
2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe
-
Size
602KB
-
MD5
93f6a9745c9a087834eed626006cc942
-
SHA1
0422a0c6aef667d2a422b004410fa4f61b302774
-
SHA256
2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b
-
SHA512
e3bac478f08fd373447f299ed0fefa9ce8fa9e787a38418693d73aba6078a2d161283856dc45744c70c352d6ffb7433d12e042a1362525423a58dcc7cf904721
-
SSDEEP
12288:9Iny5DYTcIMZaWIqHZtUMgJY6bxSl41Wbsm1RTQc0I3MUy:pUTcLwWTZtUjbU1bsmXd3
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe -
Executes dropped EXE 5 IoCs
pid Process 1920 installd.exe 776 nethtsrv.exe 1756 netupdsrv.exe 1672 nethtsrv.exe 1712 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 1920 installd.exe 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 776 nethtsrv.exe 776 nethtsrv.exe 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 1672 nethtsrv.exe 1672 nethtsrv.exe 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe File created C:\Windows\SysWOW64\hfpapi.dll 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe File created C:\Windows\SysWOW64\installd.exe 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe File created C:\Windows\SysWOW64\nethtsrv.exe 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe File created C:\Windows\SysWOW64\netupdsrv.exe 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1672 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 1824 wrote to memory of 1020 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 27 PID 1824 wrote to memory of 1020 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 27 PID 1824 wrote to memory of 1020 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 27 PID 1824 wrote to memory of 1020 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 27 PID 1020 wrote to memory of 2020 1020 net.exe 29 PID 1020 wrote to memory of 2020 1020 net.exe 29 PID 1020 wrote to memory of 2020 1020 net.exe 29 PID 1020 wrote to memory of 2020 1020 net.exe 29 PID 1824 wrote to memory of 1924 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 30 PID 1824 wrote to memory of 1924 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 30 PID 1824 wrote to memory of 1924 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 30 PID 1824 wrote to memory of 1924 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 30 PID 1924 wrote to memory of 1640 1924 net.exe 32 PID 1924 wrote to memory of 1640 1924 net.exe 32 PID 1924 wrote to memory of 1640 1924 net.exe 32 PID 1924 wrote to memory of 1640 1924 net.exe 32 PID 1824 wrote to memory of 1920 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 33 PID 1824 wrote to memory of 1920 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 33 PID 1824 wrote to memory of 1920 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 33 PID 1824 wrote to memory of 1920 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 33 PID 1824 wrote to memory of 1920 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 33 PID 1824 wrote to memory of 1920 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 33 PID 1824 wrote to memory of 1920 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 33 PID 1824 wrote to memory of 776 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 35 PID 1824 wrote to memory of 776 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 35 PID 1824 wrote to memory of 776 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 35 PID 1824 wrote to memory of 776 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 35 PID 1824 wrote to memory of 1756 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 37 PID 1824 wrote to memory of 1756 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 37 PID 1824 wrote to memory of 1756 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 37 PID 1824 wrote to memory of 1756 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 37 PID 1824 wrote to memory of 1756 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 37 PID 1824 wrote to memory of 1756 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 37 PID 1824 wrote to memory of 1756 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 37 PID 1824 wrote to memory of 1396 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 39 PID 1824 wrote to memory of 1396 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 39 PID 1824 wrote to memory of 1396 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 39 PID 1824 wrote to memory of 1396 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 39 PID 1396 wrote to memory of 1112 1396 net.exe 41 PID 1396 wrote to memory of 1112 1396 net.exe 41 PID 1396 wrote to memory of 1112 1396 net.exe 41 PID 1396 wrote to memory of 1112 1396 net.exe 41 PID 1824 wrote to memory of 2024 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 43 PID 1824 wrote to memory of 2024 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 43 PID 1824 wrote to memory of 2024 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 43 PID 1824 wrote to memory of 2024 1824 2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe 43 PID 2024 wrote to memory of 2044 2024 net.exe 45 PID 2024 wrote to memory of 2044 2024 net.exe 45 PID 2024 wrote to memory of 2044 2024 net.exe 45 PID 2024 wrote to memory of 2044 2024 net.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe"C:\Users\Admin\AppData\Local\Temp\2a83c62a5ef0f95dc338f406b1bdbd553317c8b6f7a41aab6224d0008a0a1b6b.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:2020
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:1640
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1920
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:776
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1756
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1112
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:2044
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:1712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD593988859ff224644e0c206306ac47aab
SHA152626b0417af161ee4671370cd0a8e09af353f91
SHA256f844a16a813f96e056ea9021b2432904b1a56a9b8672715397ea31618e47f958
SHA512121a6bb84c9fe0a6cba949e5d3f07e3d82cf9d3e2962e78829cf199cbb7920a66c885ef38dce7f8e3053f0ab169b0328538d79ee5f11aa592dca9aac90da16f6
-
Filesize
244KB
MD52d7c7211c124e01746359333bfe8ebff
SHA1dd77110f96f344670a09ab3c234de7b4ff239eaf
SHA25638751735955255e27d7446a406d66cba4786e506ead224e426bf0661aca3db61
SHA5125f66f4891d4262c5773d2930877704e4beccaf7483a0b3066d4390cf1e16a11497937c90b4c1791908c8986a5dc7387204dd250a896387881e83bc6a64e66bb6
-
Filesize
108KB
MD5843118b844afb19d4d9c465b82ccd4cf
SHA1a341cf608f66fd136f4f003d4f6de3cc6a2ace58
SHA256e62b8a0722a96c872f9bc34646a7aa05cbf992dfdbd3a4e4534769afc0810f32
SHA512377f278a75893d3bf7d188f65cd3ef83730ead13d6b478d082d503768d3c3b7120cc34f60c902e1a5caa40c8b94856f28013204e45cc5db31c81ba5c82ce04bb
-
Filesize
176KB
MD55f9ecb53f2668627533742a9b8714675
SHA1d82ee4ce633b8b1e5b2eee7554e35a333bf52272
SHA2567728937652995d81081c8c630057733f051a178da5c15bc75625878336d55a42
SHA51207128c7198b2cb95c2316f1861e7e7a669f6970e8b2ad5b6f639d8be91ce969057b4e4c1dc44b7e90fcb9967bdf99781e58e5f3e5c31fc50f3c42cb217a89bf3
-
Filesize
176KB
MD55f9ecb53f2668627533742a9b8714675
SHA1d82ee4ce633b8b1e5b2eee7554e35a333bf52272
SHA2567728937652995d81081c8c630057733f051a178da5c15bc75625878336d55a42
SHA51207128c7198b2cb95c2316f1861e7e7a669f6970e8b2ad5b6f639d8be91ce969057b4e4c1dc44b7e90fcb9967bdf99781e58e5f3e5c31fc50f3c42cb217a89bf3
-
Filesize
159KB
MD531368b66e45b3156567774e8da840711
SHA137811ae24fd058dc02de6937901a75495ac5b4ec
SHA256eafb47c31f1299905a773e6ae80583c7e8462d3f83908d351e89cfafa7d4dbbc
SHA512e4fa0b5cde2ba910364753d78d27378d54bd2db849ab1509ac1c9c87e1657cfc70182b9dd1f7512753e8a543e21b44ef845a7036970db9ec209699c1998bf670
-
Filesize
159KB
MD531368b66e45b3156567774e8da840711
SHA137811ae24fd058dc02de6937901a75495ac5b4ec
SHA256eafb47c31f1299905a773e6ae80583c7e8462d3f83908d351e89cfafa7d4dbbc
SHA512e4fa0b5cde2ba910364753d78d27378d54bd2db849ab1509ac1c9c87e1657cfc70182b9dd1f7512753e8a543e21b44ef845a7036970db9ec209699c1998bf670
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD593988859ff224644e0c206306ac47aab
SHA152626b0417af161ee4671370cd0a8e09af353f91
SHA256f844a16a813f96e056ea9021b2432904b1a56a9b8672715397ea31618e47f958
SHA512121a6bb84c9fe0a6cba949e5d3f07e3d82cf9d3e2962e78829cf199cbb7920a66c885ef38dce7f8e3053f0ab169b0328538d79ee5f11aa592dca9aac90da16f6
-
Filesize
106KB
MD593988859ff224644e0c206306ac47aab
SHA152626b0417af161ee4671370cd0a8e09af353f91
SHA256f844a16a813f96e056ea9021b2432904b1a56a9b8672715397ea31618e47f958
SHA512121a6bb84c9fe0a6cba949e5d3f07e3d82cf9d3e2962e78829cf199cbb7920a66c885ef38dce7f8e3053f0ab169b0328538d79ee5f11aa592dca9aac90da16f6
-
Filesize
106KB
MD593988859ff224644e0c206306ac47aab
SHA152626b0417af161ee4671370cd0a8e09af353f91
SHA256f844a16a813f96e056ea9021b2432904b1a56a9b8672715397ea31618e47f958
SHA512121a6bb84c9fe0a6cba949e5d3f07e3d82cf9d3e2962e78829cf199cbb7920a66c885ef38dce7f8e3053f0ab169b0328538d79ee5f11aa592dca9aac90da16f6
-
Filesize
244KB
MD52d7c7211c124e01746359333bfe8ebff
SHA1dd77110f96f344670a09ab3c234de7b4ff239eaf
SHA25638751735955255e27d7446a406d66cba4786e506ead224e426bf0661aca3db61
SHA5125f66f4891d4262c5773d2930877704e4beccaf7483a0b3066d4390cf1e16a11497937c90b4c1791908c8986a5dc7387204dd250a896387881e83bc6a64e66bb6
-
Filesize
244KB
MD52d7c7211c124e01746359333bfe8ebff
SHA1dd77110f96f344670a09ab3c234de7b4ff239eaf
SHA25638751735955255e27d7446a406d66cba4786e506ead224e426bf0661aca3db61
SHA5125f66f4891d4262c5773d2930877704e4beccaf7483a0b3066d4390cf1e16a11497937c90b4c1791908c8986a5dc7387204dd250a896387881e83bc6a64e66bb6
-
Filesize
108KB
MD5843118b844afb19d4d9c465b82ccd4cf
SHA1a341cf608f66fd136f4f003d4f6de3cc6a2ace58
SHA256e62b8a0722a96c872f9bc34646a7aa05cbf992dfdbd3a4e4534769afc0810f32
SHA512377f278a75893d3bf7d188f65cd3ef83730ead13d6b478d082d503768d3c3b7120cc34f60c902e1a5caa40c8b94856f28013204e45cc5db31c81ba5c82ce04bb
-
Filesize
176KB
MD55f9ecb53f2668627533742a9b8714675
SHA1d82ee4ce633b8b1e5b2eee7554e35a333bf52272
SHA2567728937652995d81081c8c630057733f051a178da5c15bc75625878336d55a42
SHA51207128c7198b2cb95c2316f1861e7e7a669f6970e8b2ad5b6f639d8be91ce969057b4e4c1dc44b7e90fcb9967bdf99781e58e5f3e5c31fc50f3c42cb217a89bf3
-
Filesize
159KB
MD531368b66e45b3156567774e8da840711
SHA137811ae24fd058dc02de6937901a75495ac5b4ec
SHA256eafb47c31f1299905a773e6ae80583c7e8462d3f83908d351e89cfafa7d4dbbc
SHA512e4fa0b5cde2ba910364753d78d27378d54bd2db849ab1509ac1c9c87e1657cfc70182b9dd1f7512753e8a543e21b44ef845a7036970db9ec209699c1998bf670