Analysis
-
max time kernel
158s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 12:43
Static task
static1
Behavioral task
behavioral1
Sample
cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe
Resource
win10v2004-20220812-en
General
-
Target
cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe
-
Size
784KB
-
MD5
37f9ac0e96468f74805962394b517848
-
SHA1
65a0a6e164c93ac9a9fbb37468f517a8a5b3bfd2
-
SHA256
cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1
-
SHA512
8996d8c5eb85fbaefc9af493fd394c276bd39ee8ef1068ebd0afef5a2d6ed4f51329b490925f1baecad9023ab847c4d9df0e97b27f49543bdd134eaaecc83dd1
-
SSDEEP
24576:tzYXFB85pZxx9+WPAcsrYdeCEIOzI4+j4el6/IRBe6:yVB85prts+eCEIapY4el6/A
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 7 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000300000000072d-135.dat acprotect behavioral2/files/0x000300000000072f-141.dat acprotect behavioral2/files/0x000300000000072d-144.dat acprotect behavioral2/files/0x000300000000072d-143.dat acprotect behavioral2/files/0x0003000000000731-142.dat acprotect behavioral2/files/0x000300000000072f-146.dat acprotect behavioral2/files/0x000300000000072f-145.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 5088 upx.exe 4768 svchost.exe¤þ.exe -
resource yara_rule behavioral2/files/0x0003000000000727-134.dat upx behavioral2/files/0x0003000000000727-133.dat upx behavioral2/files/0x000300000000072d-135.dat upx behavioral2/memory/5088-136-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/5088-137-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral2/files/0x0003000000000733-139.dat upx behavioral2/files/0x0003000000000733-140.dat upx behavioral2/files/0x000300000000072f-141.dat upx behavioral2/files/0x000300000000072d-144.dat upx behavioral2/files/0x000300000000072d-143.dat upx behavioral2/files/0x0003000000000731-142.dat upx behavioral2/files/0x000300000000072f-146.dat upx behavioral2/files/0x000300000000072f-145.dat upx behavioral2/memory/4768-147-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/4768-148-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral2/memory/4768-149-0x00000000005D0000-0x00000000005F4000-memory.dmp upx behavioral2/memory/5088-151-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral2/memory/5088-152-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral2/memory/4768-154-0x0000000010000000-0x000000001012A000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe -
Loads dropped DLL 4 IoCs
pid Process 5088 upx.exe 4768 svchost.exe¤þ.exe 4768 svchost.exe¤þ.exe 4768 svchost.exe¤þ.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchost.exe¤þ.exe upx.exe File created C:\Windows\SysWOW64\svchost.exe¤þ.dll svchost.exe¤þ.exe File opened for modification C:\Windows\SysWOW64\svchost.exe¤þ.dll svchost.exe¤þ.exe File created C:\Windows\SysWOW64\svchost.exe¤þ.exe upx.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\dp1.fne svchost.exe¤þ.exe File created C:\Program Files\Internet Explorer\Exmlrpc.fne svchost.exe¤þ.exe File opened for modification C:\Program Files\Internet Explorer\Exmlrpc.fne svchost.exe¤þ.exe File created C:\Program Files\Internet Explorer\krnln.fnr svchost.exe¤þ.exe File opened for modification C:\Program Files\Internet Explorer\krnln.fnr svchost.exe¤þ.exe File created C:\Program Files\Internet Explorer\Angel.DLL svchost.exe¤þ.exe File opened for modification C:\Program Files\Internet Explorer\Angel.DLL svchost.exe¤þ.exe File created C:\Program Files\Internet Explorer\dp1.fne svchost.exe¤þ.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\upx.exe upx.exe File created C:\Windows\upx.exe cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe File opened for modification C:\Windows\upx.exe cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe File created C:\Windows\Fonts\svchost.exe¤þ.jpg svchost.exe¤þ.exe File opened for modification C:\Windows\Fonts\svchost.exe¤þ.jpg svchost.exe¤þ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3707651824" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{07E6ABF7-7576-11ED-B696-FE977829BE37} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3707651824" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3709369624" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000962" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000962" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377103508" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "NO" svchost.exe¤þ.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31000962" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31000962" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3709369624" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5088 upx.exe 5088 upx.exe 4768 svchost.exe¤þ.exe 4768 svchost.exe¤þ.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4744 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 5088 upx.exe 4768 svchost.exe¤þ.exe 4744 IEXPLORE.EXE 4744 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE 1092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1796 wrote to memory of 5088 1796 cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe 79 PID 1796 wrote to memory of 5088 1796 cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe 79 PID 1796 wrote to memory of 5088 1796 cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe 79 PID 5088 wrote to memory of 4768 5088 upx.exe 80 PID 5088 wrote to memory of 4768 5088 upx.exe 80 PID 5088 wrote to memory of 4768 5088 upx.exe 80 PID 4768 wrote to memory of 4744 4768 svchost.exe¤þ.exe 81 PID 4768 wrote to memory of 4744 4768 svchost.exe¤þ.exe 81 PID 4744 wrote to memory of 1092 4744 IEXPLORE.EXE 82 PID 4744 wrote to memory of 1092 4744 IEXPLORE.EXE 82 PID 4744 wrote to memory of 1092 4744 IEXPLORE.EXE 82 PID 5088 wrote to memory of 4536 5088 upx.exe 83 PID 5088 wrote to memory of 4536 5088 upx.exe 83 PID 5088 wrote to memory of 4536 5088 upx.exe 83 PID 4768 wrote to memory of 4744 4768 svchost.exe¤þ.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe"C:\Users\Admin\AppData\Local\Temp\cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\upx.exe"C:\Windows\upx.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\svchost.exe¤þ.exeC:\Windows\system32\svchost.exe¤þ.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4744 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1092
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\delus.bat3⤵PID:4536
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5f8f8086f87156d14091b152fcaadc3ce
SHA1fe3cfbf9e2e871c948300473593dfcf189013386
SHA2568d92f28b70ed5265fafad8b37ce049b0b8ecad038745173acc35a21b8222bf56
SHA5121235be77513694a1478459e999631920be42183a6993dc1f93333831eaa54ea60c7d8617029289c95fed2f861fc7aa79da551c128df4428d23752044eb68ba7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD500c589e5f90b0fac5222413ac4939c16
SHA18f84a7847512c2b248f2e1cf86fd31c2cb94684a
SHA2561ad70bd0454821db26697103f711cc10bb19fe24a45515066bbe626c8294560f
SHA512bb42285af06183d96f27b4de55b1f41683a4a5341d950785f7fdd5963974a79787780e741924605573363ee075865dd4615656362c2d745d8e28d3314206c1bf
-
Filesize
34KB
MD5387cf1d2f17aff6967f3107773764513
SHA1b971bcd44988bee744f8133acb032e07d9dcd1db
SHA25674c55aaee905be674763d679ca05a6baaf93f456b5d8935d6293e523766968c6
SHA51219a4fb39b2f9863c92d76016290e701fd6bb1aa5d889896666922fd862d5b72b95a97aa27d3d0b3218233ba9dbcb3db147efbf9e61e5be853d4d3672e87bfd5c
-
Filesize
56KB
MD56649262561fba5d19f8b99dd251b5d02
SHA1286e2ab6bc2220b3c9a83720c4c612623210e10f
SHA256824afe6bde1c2890077e9a40c4261a77a1d736429709a45d68ed508581e74771
SHA512688bd75b1e9661f425a21577063362e609ce496880a4780012317d56075095e5804fb7b849b32fbbea06fbbff5d47a5534113b6613f1a236b2a76cd043bba7ef
-
Filesize
56KB
MD56649262561fba5d19f8b99dd251b5d02
SHA1286e2ab6bc2220b3c9a83720c4c612623210e10f
SHA256824afe6bde1c2890077e9a40c4261a77a1d736429709a45d68ed508581e74771
SHA512688bd75b1e9661f425a21577063362e609ce496880a4780012317d56075095e5804fb7b849b32fbbea06fbbff5d47a5534113b6613f1a236b2a76cd043bba7ef
-
Filesize
56KB
MD56649262561fba5d19f8b99dd251b5d02
SHA1286e2ab6bc2220b3c9a83720c4c612623210e10f
SHA256824afe6bde1c2890077e9a40c4261a77a1d736429709a45d68ed508581e74771
SHA512688bd75b1e9661f425a21577063362e609ce496880a4780012317d56075095e5804fb7b849b32fbbea06fbbff5d47a5534113b6613f1a236b2a76cd043bba7ef
-
Filesize
406KB
MD5e79169d47394020f7c893abb840b61bb
SHA1c5b9c2cbef3d5458b52ebb67461e84432673fb1b
SHA25611c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc
SHA51221ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a
-
Filesize
406KB
MD5e79169d47394020f7c893abb840b61bb
SHA1c5b9c2cbef3d5458b52ebb67461e84432673fb1b
SHA25611c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc
SHA51221ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a
-
Filesize
406KB
MD5e79169d47394020f7c893abb840b61bb
SHA1c5b9c2cbef3d5458b52ebb67461e84432673fb1b
SHA25611c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc
SHA51221ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a
-
Filesize
600KB
MD50958d11749015e3ad51f4039a7da6433
SHA128e74cf511b30c64ea46dddee0a0ed9d3c0a29bf
SHA2568e2af41d038c621c95c9df9ab221bec0ea2acb0e7266029acee7ce95e1709f97
SHA5129ca4c969e69ce635fb54db2cac47b85914615071b1d6f5aeb59788851046ef14cb397ef2aa5e521c2e0e35e54e81409a171da825c31178c45a30980fa2aaca67
-
Filesize
600KB
MD50958d11749015e3ad51f4039a7da6433
SHA128e74cf511b30c64ea46dddee0a0ed9d3c0a29bf
SHA2568e2af41d038c621c95c9df9ab221bec0ea2acb0e7266029acee7ce95e1709f97
SHA5129ca4c969e69ce635fb54db2cac47b85914615071b1d6f5aeb59788851046ef14cb397ef2aa5e521c2e0e35e54e81409a171da825c31178c45a30980fa2aaca67
-
Filesize
600KB
MD50958d11749015e3ad51f4039a7da6433
SHA128e74cf511b30c64ea46dddee0a0ed9d3c0a29bf
SHA2568e2af41d038c621c95c9df9ab221bec0ea2acb0e7266029acee7ce95e1709f97
SHA5129ca4c969e69ce635fb54db2cac47b85914615071b1d6f5aeb59788851046ef14cb397ef2aa5e521c2e0e35e54e81409a171da825c31178c45a30980fa2aaca67
-
Filesize
600KB
MD50958d11749015e3ad51f4039a7da6433
SHA128e74cf511b30c64ea46dddee0a0ed9d3c0a29bf
SHA2568e2af41d038c621c95c9df9ab221bec0ea2acb0e7266029acee7ce95e1709f97
SHA5129ca4c969e69ce635fb54db2cac47b85914615071b1d6f5aeb59788851046ef14cb397ef2aa5e521c2e0e35e54e81409a171da825c31178c45a30980fa2aaca67
-
Filesize
98B
MD5bb62f4a2ac894b3f45c155c08df01d25
SHA1d0f06cafa401a217fae0f65f85df4b4af05a5bbf
SHA2565a3a35d103d4d32a00fb9c1f0646b25a8ce1e997bd693985a8065446d1080fd3
SHA5122426afe80ce56e88d7b4df811d98b3aa0cc946d25970a484cc12b92a6bd2f121bbe3092a427d4f7935ccc6519a709fde0a7aa745086940170ebde9b63e6fb99c