Analysis
-
max time kernel
87s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 11:19
Static task
static1
Behavioral task
behavioral1
Sample
409d02f41923921fba426747e30eb66837f1b08a5b42d02bcb4a7b03a0ba83ef.exe
Resource
win10v2004-20230220-en
General
-
Target
409d02f41923921fba426747e30eb66837f1b08a5b42d02bcb4a7b03a0ba83ef.exe
-
Size
4.7MB
-
MD5
f9b585080f71f1a170913072e24712c7
-
SHA1
b48b37666dfb654adbd5a674343c424d811ed05f
-
SHA256
409d02f41923921fba426747e30eb66837f1b08a5b42d02bcb4a7b03a0ba83ef
-
SHA512
d0b0102f271c63cdbdd5cd1d23029a4f5de86780bf1a3759ffc584e9313e6df0f2a870f7e7d1d1adf5b4d3f60707fb5607861059114ba591a93a1c03f646b002
-
SSDEEP
98304:+Jdapp2aFdKOggt2h91qfE1AnjIiR707hkzspTWHHuE7kRtgHta7eDPJKX:ucCaFdF49EfZRIOIsH9ZHtYW
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 33 3252 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 3252 rundll32.exe 3252 rundll32.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3252 set thread context of 4996 3252 rundll32.exe 94 PID 3252 set thread context of 1132 3252 rundll32.exe 96 PID 3252 set thread context of 1716 3252 rundll32.exe 97 PID 3252 set thread context of 1568 3252 rundll32.exe 98 PID 3252 set thread context of 1692 3252 rundll32.exe 99 PID 3252 set thread context of 4948 3252 rundll32.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4140 2748 WerFault.exe 83 -
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe -
Modifies registry class 50 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe 3252 rundll32.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 4996 rundll32.exe 1132 rundll32.exe 1716 rundll32.exe 1568 rundll32.exe 1692 rundll32.exe 4948 rundll32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2748 wrote to memory of 3252 2748 409d02f41923921fba426747e30eb66837f1b08a5b42d02bcb4a7b03a0ba83ef.exe 90 PID 2748 wrote to memory of 3252 2748 409d02f41923921fba426747e30eb66837f1b08a5b42d02bcb4a7b03a0ba83ef.exe 90 PID 2748 wrote to memory of 3252 2748 409d02f41923921fba426747e30eb66837f1b08a5b42d02bcb4a7b03a0ba83ef.exe 90 PID 3252 wrote to memory of 4996 3252 rundll32.exe 94 PID 3252 wrote to memory of 4996 3252 rundll32.exe 94 PID 3252 wrote to memory of 4996 3252 rundll32.exe 94 PID 3252 wrote to memory of 1132 3252 rundll32.exe 96 PID 3252 wrote to memory of 1132 3252 rundll32.exe 96 PID 3252 wrote to memory of 1132 3252 rundll32.exe 96 PID 3252 wrote to memory of 1716 3252 rundll32.exe 97 PID 3252 wrote to memory of 1716 3252 rundll32.exe 97 PID 3252 wrote to memory of 1716 3252 rundll32.exe 97 PID 3252 wrote to memory of 1568 3252 rundll32.exe 98 PID 3252 wrote to memory of 1568 3252 rundll32.exe 98 PID 3252 wrote to memory of 1568 3252 rundll32.exe 98 PID 3252 wrote to memory of 1692 3252 rundll32.exe 99 PID 3252 wrote to memory of 1692 3252 rundll32.exe 99 PID 3252 wrote to memory of 1692 3252 rundll32.exe 99 PID 3252 wrote to memory of 4948 3252 rundll32.exe 100 PID 3252 wrote to memory of 4948 3252 rundll32.exe 100 PID 3252 wrote to memory of 4948 3252 rundll32.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\409d02f41923921fba426747e30eb66837f1b08a5b42d02bcb4a7b03a0ba83ef.exe"C:\Users\Admin\AppData\Local\Temp\409d02f41923921fba426747e30eb66837f1b08a5b42d02bcb4a7b03a0ba83ef.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Otpsrodoserw.dll,start2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4996
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1132
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1716
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1568
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1692
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4948
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵PID:4740
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵PID:3452
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵PID:1004
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵PID:4368
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵PID:1708
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵PID:2728
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵PID:548
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵PID:3984
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵PID:4184
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵PID:1484
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 223933⤵PID:1104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 4122⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2748 -ip 27481⤵PID:3128
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4120
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD58ea6481be98e97afae4f4314104386ba
SHA11e9aa1b731e9c7dfce21d83c2be6f7ee64e94f00
SHA2567443717c4cb0dd014d71436badd97d3f5d324c0fc66be9d8ae411fa8244041ca
SHA5126918fe0a57a4ff490997e8f419071d04a4151f81b4a31f1c5b1e28d6687a554e157bf2ccf560e519630e29db9c5acac12459c40567c0d1788fd78d41d2c74233
-
Filesize
5.4MB
MD58ea6481be98e97afae4f4314104386ba
SHA11e9aa1b731e9c7dfce21d83c2be6f7ee64e94f00
SHA2567443717c4cb0dd014d71436badd97d3f5d324c0fc66be9d8ae411fa8244041ca
SHA5126918fe0a57a4ff490997e8f419071d04a4151f81b4a31f1c5b1e28d6687a554e157bf2ccf560e519630e29db9c5acac12459c40567c0d1788fd78d41d2c74233
-
Filesize
5.4MB
MD58ea6481be98e97afae4f4314104386ba
SHA11e9aa1b731e9c7dfce21d83c2be6f7ee64e94f00
SHA2567443717c4cb0dd014d71436badd97d3f5d324c0fc66be9d8ae411fa8244041ca
SHA5126918fe0a57a4ff490997e8f419071d04a4151f81b4a31f1c5b1e28d6687a554e157bf2ccf560e519630e29db9c5acac12459c40567c0d1788fd78d41d2c74233