Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe
Resource
win10v2004-20221111-en
General
-
Target
88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe
-
Size
562KB
-
MD5
0bee61b164bfdb66c7d9dbe4d933fba3
-
SHA1
b9f2fc3c64de19df34a390f009ec260bb1caf969
-
SHA256
88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603
-
SHA512
a893ff5bf54e7ba8b73ae05ac4e5fbbd6b05eb3d432d280261984366cb9d5b9a974fc9187c02b9c18237189a18ce40145e7448ab7914cf4acef975c8fdc3cb7d
-
SSDEEP
12288:cPRYzJbfWrQA+M7sDGfs+Aa1U04udAj6ozKjXJK6RRvMD5v7Z:tz9fklsK0sUIoz4E6bE
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\nethfdrv.sys 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe -
Executes dropped EXE 5 IoCs
pid Process 432 installd.exe 1524 nethtsrv.exe 1724 netupdsrv.exe 1816 nethtsrv.exe 1856 netupdsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 432 installd.exe 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 1524 nethtsrv.exe 1524 nethtsrv.exe 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 1816 nethtsrv.exe 1816 nethtsrv.exe 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\installd.exe 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe File created C:\Windows\SysWOW64\nethtsrv.exe 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe File created C:\Windows\SysWOW64\netupdsrv.exe 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe File created C:\Windows\SysWOW64\hfnapi.dll 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe File created C:\Windows\SysWOW64\hfpapi.dll 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\config\uninstinethnfd.exe 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe File created C:\Program Files (x86)\Common Files\Config\data.xml 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe File created C:\Program Files (x86)\Common Files\Config\ver.xml 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1816 nethtsrv.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 960 wrote to memory of 1376 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 27 PID 960 wrote to memory of 1376 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 27 PID 960 wrote to memory of 1376 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 27 PID 960 wrote to memory of 1376 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 27 PID 1376 wrote to memory of 1676 1376 net.exe 29 PID 1376 wrote to memory of 1676 1376 net.exe 29 PID 1376 wrote to memory of 1676 1376 net.exe 29 PID 1376 wrote to memory of 1676 1376 net.exe 29 PID 960 wrote to memory of 564 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 30 PID 960 wrote to memory of 564 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 30 PID 960 wrote to memory of 564 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 30 PID 960 wrote to memory of 564 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 30 PID 564 wrote to memory of 592 564 net.exe 32 PID 564 wrote to memory of 592 564 net.exe 32 PID 564 wrote to memory of 592 564 net.exe 32 PID 564 wrote to memory of 592 564 net.exe 32 PID 960 wrote to memory of 432 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 33 PID 960 wrote to memory of 432 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 33 PID 960 wrote to memory of 432 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 33 PID 960 wrote to memory of 432 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 33 PID 960 wrote to memory of 432 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 33 PID 960 wrote to memory of 432 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 33 PID 960 wrote to memory of 432 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 33 PID 960 wrote to memory of 1524 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 35 PID 960 wrote to memory of 1524 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 35 PID 960 wrote to memory of 1524 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 35 PID 960 wrote to memory of 1524 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 35 PID 960 wrote to memory of 1724 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 37 PID 960 wrote to memory of 1724 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 37 PID 960 wrote to memory of 1724 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 37 PID 960 wrote to memory of 1724 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 37 PID 960 wrote to memory of 1724 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 37 PID 960 wrote to memory of 1724 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 37 PID 960 wrote to memory of 1724 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 37 PID 960 wrote to memory of 1948 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 39 PID 960 wrote to memory of 1948 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 39 PID 960 wrote to memory of 1948 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 39 PID 960 wrote to memory of 1948 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 39 PID 1948 wrote to memory of 1812 1948 net.exe 41 PID 1948 wrote to memory of 1812 1948 net.exe 41 PID 1948 wrote to memory of 1812 1948 net.exe 41 PID 1948 wrote to memory of 1812 1948 net.exe 41 PID 960 wrote to memory of 968 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 43 PID 960 wrote to memory of 968 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 43 PID 960 wrote to memory of 968 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 43 PID 960 wrote to memory of 968 960 88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe 43 PID 968 wrote to memory of 1796 968 net.exe 45 PID 968 wrote to memory of 1796 968 net.exe 45 PID 968 wrote to memory of 1796 968 net.exe 45 PID 968 wrote to memory of 1796 968 net.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe"C:\Users\Admin\AppData\Local\Temp\88ea34b66ef8b3f4d1ae860eaea7469e1ba33bea1f39ee39c52ec4dced3a5603.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\net.exenet stop nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop nethttpservice3⤵PID:1676
-
-
-
C:\Windows\SysWOW64\net.exenet stop serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop serviceupdater3⤵PID:592
-
-
-
C:\Windows\SysWOW64\installd.exe"C:\Windows\system32\installd.exe" nethfdrv2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:432
-
-
C:\Windows\SysWOW64\nethtsrv.exe"C:\Windows\system32\nethtsrv.exe" -nfdi2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1524
-
-
C:\Windows\SysWOW64\netupdsrv.exe"C:\Windows\system32\netupdsrv.exe" -nfdi2⤵
- Executes dropped EXE
PID:1724
-
-
C:\Windows\SysWOW64\net.exenet start nethttpservice2⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start nethttpservice3⤵PID:1812
-
-
-
C:\Windows\SysWOW64\net.exenet start serviceupdater2⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start serviceupdater3⤵PID:1796
-
-
-
C:\Windows\SysWOW64\nethtsrv.exeC:\Windows\SysWOW64\nethtsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
C:\Windows\SysWOW64\netupdsrv.exeC:\Windows\SysWOW64\netupdsrv.exe1⤵
- Executes dropped EXE
PID:1856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD52899490be43e6b6b9d399f0b02c8b232
SHA18d822c55c4f801aa0785cf6b5d811a9ee653b31f
SHA25671d1cba12893a8f24576eab234d2532bab1aa2ed19e25bbb4384de8f92fbceff
SHA5122643aa24f3913c07727766cc892ebbfc041474749c1cc2b1dcc74f500e2a40adfe0934931d01078911f89c4f94b077ad6ec56401e6aa7f5ef06e086279980c5f
-
Filesize
244KB
MD581a6257f88c4f37ef871aa597ba628ac
SHA1c7a5d731b4edd43cd53dcaa5221387ce2513a6fe
SHA25626a92d4dd82ddac75308372001da498314f57ccdb21fd9cf149de667748ff214
SHA5123b4323d613b7ca299a1f53b111d0ecaf6d405872768a49e73a98f16d25dcea34db64d932fa8f38d87c7adf0930654dc99ce31e37d2fcc6456ef8d55ab1d60a3f
-
Filesize
108KB
MD5317ddaebe6d3203684db2c6952f99d43
SHA1e1a8cf7336f7a5e2377f8cded5eaab4c63ef84c4
SHA256ecbc333842853b9979bd1ab07d40a8ceb503caaf388767c829b3586180861bcf
SHA51228ac6338f75b97bd52f643126ae0ad9896443fc9c8fed3a9ba43a343bb24f1ee7efc4d6dedc33888afe90d1e2139753c50a9bf370d7bbce84b3b125dc61d79d6
-
Filesize
176KB
MD5cb50073f2ef025dd0146859159a8aa19
SHA106a2dbc5a78bf6c29d958ea4c53cdef1b1ef8d48
SHA25687376990ece72755cca09ae2ae220fe1f82ce00e3ff95f468ddb89219685c231
SHA51232973508a08017a2f21c03a525004178d4166e2b024013fe4d6ce75c3c982854064842703e615813429085c5d013ab1e275fade63c7d28058ec0aaa7d2ac6af9
-
Filesize
176KB
MD5cb50073f2ef025dd0146859159a8aa19
SHA106a2dbc5a78bf6c29d958ea4c53cdef1b1ef8d48
SHA25687376990ece72755cca09ae2ae220fe1f82ce00e3ff95f468ddb89219685c231
SHA51232973508a08017a2f21c03a525004178d4166e2b024013fe4d6ce75c3c982854064842703e615813429085c5d013ab1e275fade63c7d28058ec0aaa7d2ac6af9
-
Filesize
158KB
MD5de16fbc091dde34b7dd9b1a503c24ec2
SHA11289cc9c384f104f9b384585916350efe764866f
SHA256ab9a207acf77a906e8f7b99b3e0b74f6645ba59ce7a0b32193c9883aa5c610af
SHA512162c074bd438fbfb101773cfe53ad37b3a94c00b7e97c61a5d43c8f1c1daeb49eeb5698b8049b93f78116de8f3f7e9f1072a85d0cf0ecbc53562239d568ea0c6
-
Filesize
158KB
MD5de16fbc091dde34b7dd9b1a503c24ec2
SHA11289cc9c384f104f9b384585916350efe764866f
SHA256ab9a207acf77a906e8f7b99b3e0b74f6645ba59ce7a0b32193c9883aa5c610af
SHA512162c074bd438fbfb101773cfe53ad37b3a94c00b7e97c61a5d43c8f1c1daeb49eeb5698b8049b93f78116de8f3f7e9f1072a85d0cf0ecbc53562239d568ea0c6
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
106KB
MD52899490be43e6b6b9d399f0b02c8b232
SHA18d822c55c4f801aa0785cf6b5d811a9ee653b31f
SHA25671d1cba12893a8f24576eab234d2532bab1aa2ed19e25bbb4384de8f92fbceff
SHA5122643aa24f3913c07727766cc892ebbfc041474749c1cc2b1dcc74f500e2a40adfe0934931d01078911f89c4f94b077ad6ec56401e6aa7f5ef06e086279980c5f
-
Filesize
106KB
MD52899490be43e6b6b9d399f0b02c8b232
SHA18d822c55c4f801aa0785cf6b5d811a9ee653b31f
SHA25671d1cba12893a8f24576eab234d2532bab1aa2ed19e25bbb4384de8f92fbceff
SHA5122643aa24f3913c07727766cc892ebbfc041474749c1cc2b1dcc74f500e2a40adfe0934931d01078911f89c4f94b077ad6ec56401e6aa7f5ef06e086279980c5f
-
Filesize
106KB
MD52899490be43e6b6b9d399f0b02c8b232
SHA18d822c55c4f801aa0785cf6b5d811a9ee653b31f
SHA25671d1cba12893a8f24576eab234d2532bab1aa2ed19e25bbb4384de8f92fbceff
SHA5122643aa24f3913c07727766cc892ebbfc041474749c1cc2b1dcc74f500e2a40adfe0934931d01078911f89c4f94b077ad6ec56401e6aa7f5ef06e086279980c5f
-
Filesize
244KB
MD581a6257f88c4f37ef871aa597ba628ac
SHA1c7a5d731b4edd43cd53dcaa5221387ce2513a6fe
SHA25626a92d4dd82ddac75308372001da498314f57ccdb21fd9cf149de667748ff214
SHA5123b4323d613b7ca299a1f53b111d0ecaf6d405872768a49e73a98f16d25dcea34db64d932fa8f38d87c7adf0930654dc99ce31e37d2fcc6456ef8d55ab1d60a3f
-
Filesize
244KB
MD581a6257f88c4f37ef871aa597ba628ac
SHA1c7a5d731b4edd43cd53dcaa5221387ce2513a6fe
SHA25626a92d4dd82ddac75308372001da498314f57ccdb21fd9cf149de667748ff214
SHA5123b4323d613b7ca299a1f53b111d0ecaf6d405872768a49e73a98f16d25dcea34db64d932fa8f38d87c7adf0930654dc99ce31e37d2fcc6456ef8d55ab1d60a3f
-
Filesize
108KB
MD5317ddaebe6d3203684db2c6952f99d43
SHA1e1a8cf7336f7a5e2377f8cded5eaab4c63ef84c4
SHA256ecbc333842853b9979bd1ab07d40a8ceb503caaf388767c829b3586180861bcf
SHA51228ac6338f75b97bd52f643126ae0ad9896443fc9c8fed3a9ba43a343bb24f1ee7efc4d6dedc33888afe90d1e2139753c50a9bf370d7bbce84b3b125dc61d79d6
-
Filesize
176KB
MD5cb50073f2ef025dd0146859159a8aa19
SHA106a2dbc5a78bf6c29d958ea4c53cdef1b1ef8d48
SHA25687376990ece72755cca09ae2ae220fe1f82ce00e3ff95f468ddb89219685c231
SHA51232973508a08017a2f21c03a525004178d4166e2b024013fe4d6ce75c3c982854064842703e615813429085c5d013ab1e275fade63c7d28058ec0aaa7d2ac6af9
-
Filesize
158KB
MD5de16fbc091dde34b7dd9b1a503c24ec2
SHA11289cc9c384f104f9b384585916350efe764866f
SHA256ab9a207acf77a906e8f7b99b3e0b74f6645ba59ce7a0b32193c9883aa5c610af
SHA512162c074bd438fbfb101773cfe53ad37b3a94c00b7e97c61a5d43c8f1c1daeb49eeb5698b8049b93f78116de8f3f7e9f1072a85d0cf0ecbc53562239d568ea0c6