Analysis
-
max time kernel
140s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
03f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
03f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164.exe
Resource
win10v2004-20221111-en
General
-
Target
03f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164.exe
-
Size
71KB
-
MD5
52df7dc7aacfab45a8cd20f49d1a1870
-
SHA1
8022acd70b13592402a749f214edf4ea56a67d89
-
SHA256
03f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
-
SHA512
3ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
SSDEEP
1536:eE0Qxm0M13nc6tfmoJMw+c4Jc2qDYe4pxJJz54ZEbHFiFPZHOXDyT:z0QJM9c6hmoX+c4Jg4pdz5v69fT
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 764 Nxcxt.exe 1904 Nxcxt.exe 1664 Nxcxt.exe 796 Nxcxt.exe 1636 Nxcxt.exe 1348 Nxcxt.exe 480 Nxcxt.exe 280 Nxcxt.exe 1928 Nxcxt.exe -
Loads dropped DLL 18 IoCs
pid Process 1624 03f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164.exe 1624 03f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164.exe 764 Nxcxt.exe 764 Nxcxt.exe 1904 Nxcxt.exe 1904 Nxcxt.exe 1664 Nxcxt.exe 1664 Nxcxt.exe 796 Nxcxt.exe 796 Nxcxt.exe 1636 Nxcxt.exe 1636 Nxcxt.exe 1348 Nxcxt.exe 1348 Nxcxt.exe 480 Nxcxt.exe 480 Nxcxt.exe 280 Nxcxt.exe 280 Nxcxt.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Nxcxt.exe 03f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164.exe File opened for modification C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File created C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File opened for modification C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File opened for modification C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File created C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File created C:\Windows\SysWOW64\Nxcxt.exe 03f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164.exe File opened for modification C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File created C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File created C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File created C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File created C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File created C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File opened for modification C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File opened for modification C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File created C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File opened for modification C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File opened for modification C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File created C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe File opened for modification C:\Windows\SysWOW64\Nxcxt.exe Nxcxt.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1624 wrote to memory of 764 1624 03f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164.exe 28 PID 1624 wrote to memory of 764 1624 03f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164.exe 28 PID 1624 wrote to memory of 764 1624 03f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164.exe 28 PID 1624 wrote to memory of 764 1624 03f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164.exe 28 PID 764 wrote to memory of 1904 764 Nxcxt.exe 29 PID 764 wrote to memory of 1904 764 Nxcxt.exe 29 PID 764 wrote to memory of 1904 764 Nxcxt.exe 29 PID 764 wrote to memory of 1904 764 Nxcxt.exe 29 PID 1904 wrote to memory of 1664 1904 Nxcxt.exe 30 PID 1904 wrote to memory of 1664 1904 Nxcxt.exe 30 PID 1904 wrote to memory of 1664 1904 Nxcxt.exe 30 PID 1904 wrote to memory of 1664 1904 Nxcxt.exe 30 PID 1664 wrote to memory of 796 1664 Nxcxt.exe 31 PID 1664 wrote to memory of 796 1664 Nxcxt.exe 31 PID 1664 wrote to memory of 796 1664 Nxcxt.exe 31 PID 1664 wrote to memory of 796 1664 Nxcxt.exe 31 PID 796 wrote to memory of 1636 796 Nxcxt.exe 32 PID 796 wrote to memory of 1636 796 Nxcxt.exe 32 PID 796 wrote to memory of 1636 796 Nxcxt.exe 32 PID 796 wrote to memory of 1636 796 Nxcxt.exe 32 PID 1636 wrote to memory of 1348 1636 Nxcxt.exe 33 PID 1636 wrote to memory of 1348 1636 Nxcxt.exe 33 PID 1636 wrote to memory of 1348 1636 Nxcxt.exe 33 PID 1636 wrote to memory of 1348 1636 Nxcxt.exe 33 PID 1348 wrote to memory of 480 1348 Nxcxt.exe 34 PID 1348 wrote to memory of 480 1348 Nxcxt.exe 34 PID 1348 wrote to memory of 480 1348 Nxcxt.exe 34 PID 1348 wrote to memory of 480 1348 Nxcxt.exe 34 PID 480 wrote to memory of 280 480 Nxcxt.exe 35 PID 480 wrote to memory of 280 480 Nxcxt.exe 35 PID 480 wrote to memory of 280 480 Nxcxt.exe 35 PID 480 wrote to memory of 280 480 Nxcxt.exe 35 PID 280 wrote to memory of 1928 280 Nxcxt.exe 36 PID 280 wrote to memory of 1928 280 Nxcxt.exe 36 PID 280 wrote to memory of 1928 280 Nxcxt.exe 36 PID 280 wrote to memory of 1928 280 Nxcxt.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\03f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164.exe"C:\Users\Admin\AppData\Local\Temp\03f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\Nxcxt.exeC:\Windows\system32\Nxcxt.exe 504 "C:\Users\Admin\AppData\Local\Temp\03f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\Nxcxt.exeC:\Windows\system32\Nxcxt.exe 536 "C:\Windows\SysWOW64\Nxcxt.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\Nxcxt.exeC:\Windows\system32\Nxcxt.exe 528 "C:\Windows\SysWOW64\Nxcxt.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\Nxcxt.exeC:\Windows\system32\Nxcxt.exe 548 "C:\Windows\SysWOW64\Nxcxt.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\Nxcxt.exeC:\Windows\system32\Nxcxt.exe 532 "C:\Windows\SysWOW64\Nxcxt.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\Nxcxt.exeC:\Windows\system32\Nxcxt.exe 552 "C:\Windows\SysWOW64\Nxcxt.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\Nxcxt.exeC:\Windows\system32\Nxcxt.exe 540 "C:\Windows\SysWOW64\Nxcxt.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Windows\SysWOW64\Nxcxt.exeC:\Windows\system32\Nxcxt.exe 544 "C:\Windows\SysWOW64\Nxcxt.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\Nxcxt.exeC:\Windows\system32\Nxcxt.exe 568 "C:\Windows\SysWOW64\Nxcxt.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1928
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e
-
Filesize
71KB
MD552df7dc7aacfab45a8cd20f49d1a1870
SHA18022acd70b13592402a749f214edf4ea56a67d89
SHA25603f97025a7afa0778c5f555353ce4709b362bd9f5d51fac6a12ce524cb219164
SHA5123ade3cb78dc97d002a32ebe75b3e4e5d4088af2309db9f1a12d6928e81ecb1903e68867a45e13e050dc5cb895476a30bc7f87e4b9bf771cc1d8f33529d57665e