Analysis
-
max time kernel
59s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
z1Mb_NFEmitida1.msi
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
z1Mb_NFEmitida1.msi
Resource
win10v2004-20230220-en
Errors
General
-
Target
z1Mb_NFEmitida1.msi
-
Size
1.4MB
-
MD5
f390d567bfebaecba7eb5a792ff6249b
-
SHA1
02aa56247d63b6037e7adc4492d3f494fcbdf003
-
SHA256
ac8ba32c27d3dc8fa0eef48f3d3de5032df74dd476cf0669f92fecd617c4e10d
-
SHA512
69b0ac8dd55f84ebb38d9f9dbac95df55c5c173c924ebd394683f35a9517284721a4d97e57aaef5dcd3ec76aa775e46ac15e83feb87947b4b2909fada8268a17
-
SSDEEP
24576:/DA+gxxN9Y5OcW7LIJ1MXCOJ05YbswFbT52d7xLZrudIAL8wiUYT:/DHW9YDqbCOJ05Yb59QzLZrudIAITUI
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 16 2636 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 4980 MSID21F.tmp -
Loads dropped DLL 4 IoCs
pid Process 1892 MsiExec.exe 1892 MsiExec.exe 1892 MsiExec.exe 1892 MsiExec.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell.exe Key deleted \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_9B53C6852C12A4A2B3C0061513FEE8A6 = "\"C:\\Users\\Admin\\Pictures\\AMD64_\\D81MyDoct83264D6\\BdeUnlockWizardCFacility3d02.exe\" --no-startup-window --win-session-start /prefetch:5" powershell.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSICC3F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICD59.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICE16.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{544772FC-9488-4386-969C-0779E029B3B7} msiexec.exe File opened for modification C:\Windows\Installer\MSID21F.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\e56c827.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIC8F2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID097.tmp msiexec.exe File created C:\Windows\Installer\e56c827.msi msiexec.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "247" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4320 msiexec.exe 4320 msiexec.exe 2636 powershell.exe 2636 powershell.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeShutdownPrivilege 4360 msiexec.exe Token: SeIncreaseQuotaPrivilege 4360 msiexec.exe Token: SeSecurityPrivilege 4320 msiexec.exe Token: SeCreateTokenPrivilege 4360 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4360 msiexec.exe Token: SeLockMemoryPrivilege 4360 msiexec.exe Token: SeIncreaseQuotaPrivilege 4360 msiexec.exe Token: SeMachineAccountPrivilege 4360 msiexec.exe Token: SeTcbPrivilege 4360 msiexec.exe Token: SeSecurityPrivilege 4360 msiexec.exe Token: SeTakeOwnershipPrivilege 4360 msiexec.exe Token: SeLoadDriverPrivilege 4360 msiexec.exe Token: SeSystemProfilePrivilege 4360 msiexec.exe Token: SeSystemtimePrivilege 4360 msiexec.exe Token: SeProfSingleProcessPrivilege 4360 msiexec.exe Token: SeIncBasePriorityPrivilege 4360 msiexec.exe Token: SeCreatePagefilePrivilege 4360 msiexec.exe Token: SeCreatePermanentPrivilege 4360 msiexec.exe Token: SeBackupPrivilege 4360 msiexec.exe Token: SeRestorePrivilege 4360 msiexec.exe Token: SeShutdownPrivilege 4360 msiexec.exe Token: SeDebugPrivilege 4360 msiexec.exe Token: SeAuditPrivilege 4360 msiexec.exe Token: SeSystemEnvironmentPrivilege 4360 msiexec.exe Token: SeChangeNotifyPrivilege 4360 msiexec.exe Token: SeRemoteShutdownPrivilege 4360 msiexec.exe Token: SeUndockPrivilege 4360 msiexec.exe Token: SeSyncAgentPrivilege 4360 msiexec.exe Token: SeEnableDelegationPrivilege 4360 msiexec.exe Token: SeManageVolumePrivilege 4360 msiexec.exe Token: SeImpersonatePrivilege 4360 msiexec.exe Token: SeCreateGlobalPrivilege 4360 msiexec.exe Token: SeRestorePrivilege 4320 msiexec.exe Token: SeTakeOwnershipPrivilege 4320 msiexec.exe Token: SeRestorePrivilege 4320 msiexec.exe Token: SeTakeOwnershipPrivilege 4320 msiexec.exe Token: SeRestorePrivilege 4320 msiexec.exe Token: SeTakeOwnershipPrivilege 4320 msiexec.exe Token: SeRestorePrivilege 4320 msiexec.exe Token: SeTakeOwnershipPrivilege 4320 msiexec.exe Token: SeRestorePrivilege 4320 msiexec.exe Token: SeTakeOwnershipPrivilege 4320 msiexec.exe Token: SeRestorePrivilege 4320 msiexec.exe Token: SeTakeOwnershipPrivilege 4320 msiexec.exe Token: SeRestorePrivilege 4320 msiexec.exe Token: SeTakeOwnershipPrivilege 4320 msiexec.exe Token: SeRestorePrivilege 4320 msiexec.exe Token: SeTakeOwnershipPrivilege 4320 msiexec.exe Token: SeRestorePrivilege 4320 msiexec.exe Token: SeTakeOwnershipPrivilege 4320 msiexec.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeShutdownPrivilege 3636 shutdown.exe Token: SeRemoteShutdownPrivilege 3636 shutdown.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 4360 msiexec.exe 4360 msiexec.exe 2636 powershell.exe 2636 powershell.exe 2636 powershell.exe 2636 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 744 LogonUI.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4320 wrote to memory of 1892 4320 msiexec.exe 84 PID 4320 wrote to memory of 1892 4320 msiexec.exe 84 PID 4320 wrote to memory of 1892 4320 msiexec.exe 84 PID 4320 wrote to memory of 4980 4320 msiexec.exe 85 PID 4320 wrote to memory of 4980 4320 msiexec.exe 85 PID 4320 wrote to memory of 4980 4320 msiexec.exe 85 PID 872 wrote to memory of 5012 872 cmd.exe 90 PID 872 wrote to memory of 5012 872 cmd.exe 90 PID 872 wrote to memory of 2636 872 cmd.exe 91 PID 872 wrote to memory of 2636 872 cmd.exe 91 PID 2636 wrote to memory of 3636 2636 powershell.exe 97 PID 2636 wrote to memory of 3636 2636 powershell.exe 97
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\z1Mb_NFEmitida1.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4360
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding EF7A2D8BD58F7A571E51D41BDB1D274F2⤵
- Loads dropped DLL
PID:1892
-
-
C:\Windows\Installer\MSID21F.tmp"C:\Windows\Installer\MSID21F.tmp" /DontWait /HideWindow "C:\Users\Admin\AppData\Roaming\MB_NFEXpressLTD05CrDhWbZS2Qpftwu785iNdm17Za5b®xrttlsb\MB_NFEXpressLTD05CrDhWbZS2Qpftwu785iNdm17Za5b\ba0Bmg.cmd"2⤵
- Executes dropped EXE
PID:4980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\MB_NFEXpressLTD05CrDhWbZS2Qpftwu785iNdm17Za5b®xrttlsb\MB_NFEXpressLTD05CrDhWbZS2Qpftwu785iNdm17Za5b\ba0Bmg.cmd" "1⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo %uMalVYMxLtga??l▀% "2⤵PID:5012
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -windowstyle hidden -ExecutionPolicy Bypass -nop -NoExit -Command -2⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\system32\shutdown.exe"C:\Windows\system32\shutdown.exe" -r -f -t 10 -c "Windows Updated Successfully"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39f7055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:744
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d4736a6400a3066f330f0580d6bafc49
SHA13f887c8cdc39953a567356e6d0fa05b3420f15b1
SHA2567d42ce21466fc5fd83b5ea18c3289e35c021bde60f907c735aec4bbd23935db0
SHA5125f4a5a3dd1e2bdbd2e1e8f05c5ef6b8927f7ae2a593587dadae7a5fc1b085ffdd5966983c18ea54048b779821931823d683696785647c540f7e4137b86e150d4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\MB_NFEXpressLTD05CrDhWbZS2Qpftwu785iNdm17Za5b®xrttlsb\MB_NFEXpressLTD05CrDhWbZS2Qpftwu785iNdm17Za5b\MB_NFEXpressLTD05CrDhWbZS2Qpftwu785iNdm17Za5b.ini
Filesize397B
MD553b81f14f0df5036499ce157d0967e5e
SHA11c702e2b7c0fd6ea78a9707f07b5812626e16ede
SHA25670acc54d123663d153a2ddf74a768e077672046e8171cb625cdef3e8e0729c9b
SHA512ec3b42f29ec75698d5bb63fb60f9a2cb4ccaab42d1e232f755b4e14196df8388ba0abe5b9890082529cd73cdc758ace42bcceba5a709f5984122443bc3f2999e
-
C:\Users\Admin\AppData\Roaming\MB_NFEXpressLTD05CrDhWbZS2Qpftwu785iNdm17Za5b®xrttlsb\MB_NFEXpressLTD05CrDhWbZS2Qpftwu785iNdm17Za5b\ba0Bmg.cmd
Filesize32KB
MD51a327c9254766fe95996782ac580cbe4
SHA1b31a227c0b1d2562c2796b4ffc1add6df75ee59e
SHA25621ba6a3b45b8bc8ea1ddc1215f34c4c0384770f534329cc268d5324e426d2954
SHA5122138e72ae47040620e5c99e1a962b34af1c4421451b058aefe952ca1b2d086bdab00123b8620e18a844488856338261a633c71f58c211b105b6831b5ef51bf01
-
Filesize
9.9MB
MD578c2a7a030a4773891a7f3b85ca3dee4
SHA13497c8c61795cd547860308a07b63f6abd56329a
SHA2561d9aa7661d666c59de6eaec6d59b0dc8929ddfd734c0de7694c653e1521786ec
SHA512cd5cd506a0a93148ee2b35d35cf59ed166e891d7f3d36bcebe8a9e739bedcea26cc36549dd96cc75cd9fb2923b6eb2bda59daee3e598be6b340c9f55b9bc8337
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
410KB
MD520010f9d322a1260ee0953852264a7cd
SHA16ac58fdf5e414bd6396443a420da99b87ee0e0a2
SHA256d6973be60891c55e0e97d218347dcb2009e2fe687b7df5cfd43536d2af6ea165
SHA5122f62cb4269d929f8bc97c103156de3588b38e9f4c2776d7441db270b8427c2b47bc8e57d786c06da37455b105b077b789e161b21a145a33e420522864d1f913a
-
Filesize
410KB
MD520010f9d322a1260ee0953852264a7cd
SHA16ac58fdf5e414bd6396443a420da99b87ee0e0a2
SHA256d6973be60891c55e0e97d218347dcb2009e2fe687b7df5cfd43536d2af6ea165
SHA5122f62cb4269d929f8bc97c103156de3588b38e9f4c2776d7441db270b8427c2b47bc8e57d786c06da37455b105b077b789e161b21a145a33e420522864d1f913a