Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2022, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe
Resource
win10v2004-20220812-en
General
-
Target
713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe
-
Size
695KB
-
MD5
8b4d8eeed42b28392b8d65e7b5694f9d
-
SHA1
3ca67835aa2ddc63fea13066640e0cbf3f08095e
-
SHA256
713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832
-
SHA512
d1d24d0da53ff871b4f86f3cb933149fe82eca92365a483bc98eba4ee419a639e19b1b10bece7afc77971d92783a028508f9db5dea2fdd4b72821f9ec5c08cf6
-
SSDEEP
12288:jAbu3fQ+thk6Ez1bftOY9f7JK7ijrUXp0PQXDLNycdFxPm+ZniMx8zZGDYd:jAbuPPEzxf79f787gPmLNtdXe4H8d7
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe -
Executes dropped EXE 5 IoCs
pid Process 4944 installd.exe 4648 nethtsrv.exe 2180 netupdsrv.exe 684 nethtsrv.exe 2788 netupdsrv.exe -
Loads dropped DLL 14 IoCs
pid Process 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 4944 installd.exe 4648 nethtsrv.exe 4648 nethtsrv.exe 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 684 nethtsrv.exe 684 nethtsrv.exe 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfnapi.dll 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe File created C:\Windows\SysWOW64\hfpapi.dll 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe File created C:\Windows\SysWOW64\installd.exe 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe File created C:\Windows\SysWOW64\nethtsrv.exe 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe File created C:\Windows\SysWOW64\netupdsrv.exe 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Config\data.xml 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections nethtsrv.exe -
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 684 nethtsrv.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 904 wrote to memory of 3184 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 79 PID 904 wrote to memory of 3184 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 79 PID 904 wrote to memory of 3184 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 79 PID 3184 wrote to memory of 8 3184 net.exe 81 PID 3184 wrote to memory of 8 3184 net.exe 81 PID 3184 wrote to memory of 8 3184 net.exe 81 PID 904 wrote to memory of 4640 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 82 PID 904 wrote to memory of 4640 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 82 PID 904 wrote to memory of 4640 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 82 PID 4640 wrote to memory of 4964 4640 net.exe 84 PID 4640 wrote to memory of 4964 4640 net.exe 84 PID 4640 wrote to memory of 4964 4640 net.exe 84 PID 904 wrote to memory of 4944 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 85 PID 904 wrote to memory of 4944 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 85 PID 904 wrote to memory of 4944 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 85 PID 904 wrote to memory of 4648 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 87 PID 904 wrote to memory of 4648 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 87 PID 904 wrote to memory of 4648 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 87 PID 904 wrote to memory of 2180 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 89 PID 904 wrote to memory of 2180 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 89 PID 904 wrote to memory of 2180 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 89 PID 904 wrote to memory of 260 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 91 PID 904 wrote to memory of 260 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 91 PID 904 wrote to memory of 260 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 91 PID 260 wrote to memory of 1276 260 net.exe 93 PID 260 wrote to memory of 1276 260 net.exe 93 PID 260 wrote to memory of 1276 260 net.exe 93 PID 904 wrote to memory of 1332 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 95 PID 904 wrote to memory of 1332 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 95 PID 904 wrote to memory of 1332 904 713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe 95 PID 1332 wrote to memory of 4168 1332 net.exe 97 PID 1332 wrote to memory of 4168 1332 net.exe 97 PID 1332 wrote to memory of 4168 1332 net.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe"C:\Users\Admin\AppData\Local\Temp\713c75e358fa3bdef4c0fdaa4b437a697dfb6ae9d3e63ebd16b9cabcd1754832.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:8
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:4964
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4944
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4648
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:2180
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:260 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1276
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:4168
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:684
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:2788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD52db7c521b94297749b7c43de4851d230
SHA138a4db2c20805bf47cb29f98adb60a1ac1d3ba0a
SHA2561bf7be22670760681e0cd375fe079d1d8332941bc92c03b1fc1f58458535805e
SHA512fa1a544987b7958f8a9430661a1c59bcaa56a2c997c85d643dffe2d7e16f9a38430da87963ebb07f21db4dcc2d5b70012b58ab747cc00df9c345bad590a86f2b
-
Filesize
106KB
MD52db7c521b94297749b7c43de4851d230
SHA138a4db2c20805bf47cb29f98adb60a1ac1d3ba0a
SHA2561bf7be22670760681e0cd375fe079d1d8332941bc92c03b1fc1f58458535805e
SHA512fa1a544987b7958f8a9430661a1c59bcaa56a2c997c85d643dffe2d7e16f9a38430da87963ebb07f21db4dcc2d5b70012b58ab747cc00df9c345bad590a86f2b
-
Filesize
106KB
MD52db7c521b94297749b7c43de4851d230
SHA138a4db2c20805bf47cb29f98adb60a1ac1d3ba0a
SHA2561bf7be22670760681e0cd375fe079d1d8332941bc92c03b1fc1f58458535805e
SHA512fa1a544987b7958f8a9430661a1c59bcaa56a2c997c85d643dffe2d7e16f9a38430da87963ebb07f21db4dcc2d5b70012b58ab747cc00df9c345bad590a86f2b
-
Filesize
106KB
MD52db7c521b94297749b7c43de4851d230
SHA138a4db2c20805bf47cb29f98adb60a1ac1d3ba0a
SHA2561bf7be22670760681e0cd375fe079d1d8332941bc92c03b1fc1f58458535805e
SHA512fa1a544987b7958f8a9430661a1c59bcaa56a2c997c85d643dffe2d7e16f9a38430da87963ebb07f21db4dcc2d5b70012b58ab747cc00df9c345bad590a86f2b
-
Filesize
241KB
MD5c1e0da11da529385c287a04f05f9c59b
SHA1f56d31b3bebb0f4df09b0d25f91985fcfc4e20e3
SHA256a4307caf7c64833051906318650cd56d8892a979ca8d49031f85acabfcd65c75
SHA512d01cdbff4b2bb369947730495b7b1e36c6a3ccb4b9d0f44ea3e0e3adc7c77dec6c23e8a39a95f0ba28bf71892ff42c52cdd0121e0bf07de864c3b85a0a727343
-
Filesize
241KB
MD5c1e0da11da529385c287a04f05f9c59b
SHA1f56d31b3bebb0f4df09b0d25f91985fcfc4e20e3
SHA256a4307caf7c64833051906318650cd56d8892a979ca8d49031f85acabfcd65c75
SHA512d01cdbff4b2bb369947730495b7b1e36c6a3ccb4b9d0f44ea3e0e3adc7c77dec6c23e8a39a95f0ba28bf71892ff42c52cdd0121e0bf07de864c3b85a0a727343
-
Filesize
241KB
MD5c1e0da11da529385c287a04f05f9c59b
SHA1f56d31b3bebb0f4df09b0d25f91985fcfc4e20e3
SHA256a4307caf7c64833051906318650cd56d8892a979ca8d49031f85acabfcd65c75
SHA512d01cdbff4b2bb369947730495b7b1e36c6a3ccb4b9d0f44ea3e0e3adc7c77dec6c23e8a39a95f0ba28bf71892ff42c52cdd0121e0bf07de864c3b85a0a727343
-
Filesize
108KB
MD534513f84a6106fd662a26c9b913dcdfd
SHA105ec86aab25ea497ac098db2454d00b88191c658
SHA2568187c886052bb006dc99275e7ceee337daa13783d972ea66048cf53f9aacff3e
SHA512a8322dfc27ca3f564b05ae7f175126455dd5a42eb0e6e13579f28be83f6b068bf1ae48ed0639314239d50785ec0d1c2770df578742a9c622a20223b2afb9cf74
-
Filesize
108KB
MD534513f84a6106fd662a26c9b913dcdfd
SHA105ec86aab25ea497ac098db2454d00b88191c658
SHA2568187c886052bb006dc99275e7ceee337daa13783d972ea66048cf53f9aacff3e
SHA512a8322dfc27ca3f564b05ae7f175126455dd5a42eb0e6e13579f28be83f6b068bf1ae48ed0639314239d50785ec0d1c2770df578742a9c622a20223b2afb9cf74
-
Filesize
176KB
MD54245f80a6ab267cafc387b9cb9d17b92
SHA1130e2323d7a185c33d8ea324960e79966d94fc90
SHA2561bedf0612b4c50d9c572aebe01ab12f2b3585b92b2b3dcd6fce148aea403b932
SHA512bde0a5f36e7c3cc2e0f9c51dc6fc14286267b02024bbb21b5b970d6cc19387e82db49657a53f4645655c2817fad6d33fc5347eb2a60a46559e518fb79d561d7c
-
Filesize
176KB
MD54245f80a6ab267cafc387b9cb9d17b92
SHA1130e2323d7a185c33d8ea324960e79966d94fc90
SHA2561bedf0612b4c50d9c572aebe01ab12f2b3585b92b2b3dcd6fce148aea403b932
SHA512bde0a5f36e7c3cc2e0f9c51dc6fc14286267b02024bbb21b5b970d6cc19387e82db49657a53f4645655c2817fad6d33fc5347eb2a60a46559e518fb79d561d7c
-
Filesize
176KB
MD54245f80a6ab267cafc387b9cb9d17b92
SHA1130e2323d7a185c33d8ea324960e79966d94fc90
SHA2561bedf0612b4c50d9c572aebe01ab12f2b3585b92b2b3dcd6fce148aea403b932
SHA512bde0a5f36e7c3cc2e0f9c51dc6fc14286267b02024bbb21b5b970d6cc19387e82db49657a53f4645655c2817fad6d33fc5347eb2a60a46559e518fb79d561d7c
-
Filesize
158KB
MD5dd0afa9a2c6cc17d5dc3cb31a960cfa6
SHA1c2da41ecdcafcfff2b65253f1a7218f24511efaf
SHA2569d6e9dae7b37334251f45c84ca984db5f379f33c173cfd17b556f5ce5768dd71
SHA512cd612c5f92ec7e0c08fd1a82032b944da127c511dd62b835251d76b0b934c15b506b4e43cc82c36523fc97bd017726f3c872d4e818c01ecee6bd65e362de7970
-
Filesize
158KB
MD5dd0afa9a2c6cc17d5dc3cb31a960cfa6
SHA1c2da41ecdcafcfff2b65253f1a7218f24511efaf
SHA2569d6e9dae7b37334251f45c84ca984db5f379f33c173cfd17b556f5ce5768dd71
SHA512cd612c5f92ec7e0c08fd1a82032b944da127c511dd62b835251d76b0b934c15b506b4e43cc82c36523fc97bd017726f3c872d4e818c01ecee6bd65e362de7970
-
Filesize
158KB
MD5dd0afa9a2c6cc17d5dc3cb31a960cfa6
SHA1c2da41ecdcafcfff2b65253f1a7218f24511efaf
SHA2569d6e9dae7b37334251f45c84ca984db5f379f33c173cfd17b556f5ce5768dd71
SHA512cd612c5f92ec7e0c08fd1a82032b944da127c511dd62b835251d76b0b934c15b506b4e43cc82c36523fc97bd017726f3c872d4e818c01ecee6bd65e362de7970