Analysis
-
max time kernel
118s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
02-08-2023 15:09
Behavioral task
behavioral1
Sample
rpservicesofwiINV-234183.pdf
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
rpservicesofwiINV-234183.pdf
Resource
win10v2004-20230703-en
General
-
Target
rpservicesofwiINV-234183.pdf
-
Size
22KB
-
MD5
7a25266f773351d9f95c0bcb348a5273
-
SHA1
5bbea993d1e0025c07ee6f3b5b8f9c5fbbf26015
-
SHA256
add8f5e2fb48285f61f489bab0ed52a850ab9487e83e0bc0ce9af5457fe16e75
-
SHA512
e12fa8449c5f41b56b3d76b9495f16146fed5a0ed5f3de5fcacb52b51276bc08e547a4ded03f11242a819d6388fabde005be2324603c21c4e660f4c501099060
-
SSDEEP
384:6wbWYZiyuhl5Nn8tdaMD8U1nQNguuN0YnAHm6ZgV2/FqEnRnTyquaGCzhp6sr:5bWYZiyuHnQuQAM2/FvnAquKht
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DOMStorage\mega.co.nz IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DOMStorage\mega.co.nz\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e8664bdb653864eb3b20ffc0ad3b02100000000020000000000106600000001000020000000385443bc3a58fd2c6e2d01e8875f896f16d83129520b85b95af3d0703568124a000000000e8000000002000020000000a0c9d3fc20dc8a535f2b03a92809471af1e98fc91c3cc2aadaafdca55144415f90000000cad128ee654fba545d93476aa0e1b3ca125eaf359fa34cac37e47a19b51563f1912c81c3e3ce60edda06d6371cf754802aa959a2d337416474e9f5c3139d7747d7c1398085b4798411b68602ad600ca2d80bb7efe71d13407337fccd6783a8e0a0cd69c0a8923170d8f7da5144e6cd8086418d0fff9c9ce74cb585696a436d6f1113380d9832070de8d46d737e3c86714000000082c37e9b088a1ae63fa496af1387b85871dd14fa2da17cf9f273bed042a02ff6de1ec03d7384d30be99a2afcf82b7ea08c33702976a006170c7e6120d652d11f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000e8664bdb653864eb3b20ffc0ad3b02100000000020000000000106600000001000020000000eb65338323e10305ecbd20cc67406565d425c14487f560126dbb6e81c1186d8b000000000e800000000200002000000072a2b59a4770dd8daf4655e9844046ed7d476832ed76f67b9b54ec5cc4423ef2200000001917e1660343120ccaf74ce72250e62ffacbfe9eb41ef6d7afd5ed4f93a448c040000000c1ff777f900eb472a24f99dd25b4a095c6a689c33bb24e2ca2de8dd391d2d5621380793b202e9773da04a0a4eec96e5c7042977651aa4b8056a37332e9756bd3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "397753980" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a9f58453c5d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9C790A1-3146-11EE-A701-FEA3F30CF971} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3040 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3040 AcroRd32.exe 3040 AcroRd32.exe 3040 AcroRd32.exe 3040 AcroRd32.exe 2860 iexplore.exe 2860 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2860 3040 AcroRd32.exe 28 PID 3040 wrote to memory of 2860 3040 AcroRd32.exe 28 PID 3040 wrote to memory of 2860 3040 AcroRd32.exe 28 PID 3040 wrote to memory of 2860 3040 AcroRd32.exe 28 PID 2860 wrote to memory of 2888 2860 iexplore.exe 29 PID 2860 wrote to memory of 2888 2860 iexplore.exe 29 PID 2860 wrote to memory of 2888 2860 iexplore.exe 29 PID 2860 wrote to memory of 2888 2860 iexplore.exe 29
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\rpservicesofwiINV-234183.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://adclick.g.doubleclick.net/pcs/click?xai=AKAOjstFA55hCSrFSTBDNko3225YAz6GkouTQlHjExWXRbT5OPMnSlE8Wh4LAVp-D7jWRr-LcKW0w-HH1g8lCVAK_eU-5azfUXfjqfTiHFOFWV9I8m2ZaGczGlov1iY8kMSnelCX-AHG6VYBmpcZJapT1XbdlOM3B9u9whYqpkxEpFLbkzwDao00-DL8JyS7UIxIApb_JHANRmtKLSuRcM8IWqFaP0cOc8n8jTedmwHc8oAw2MV2tRUaAnN3eaxaESpc8fovDeWslJ0A3duo5g46YzCYxQ8A56RI5MGcQw4TZj6TeWuj6jRjAe7g0X18--IBmztC1sUi6XuHkB1Ew-z_h9bv1XK-s_9L6zeDfQPtMsI3hOqp8T8545VdgCoElxs&sig=Cg0ArKJSzEpZ_YMvCKWCEAE&fbs_aeid=[gw_fbsaeid]&urlfix=1&adurl=http://173.249.58.32/rpservicesofwiINV-234183/val2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5154a4ac46478c775c9116ee69ac0b43a
SHA1fd308706087df7297ae4da07e458b494a9c738a3
SHA256d0079d1dfc025bb7fe3f21f15e85252cd04689bcd4d4da25e6774a9139214f9d
SHA5122c49e341c2c3584e4885693c6ad0ab7bcc37a30df300f7a04bca737fd859b88396822070a10cd5bc83593a5f9ea6d9518a1f75aac6fe9737bd0bb746be1a356b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53db27868f9844cde22b4af9219d42096
SHA18c8250252f255186d1e92660388cc894b239e171
SHA256144a517ddb8e5bdaff9c0ced6d329b72d40b5e068ebb9e72868908d017441365
SHA5125921a23abf343f08a3b0b3c4bb2c02cdf9cfcaa2ba824648f84b705aaaf53756058bb76a0832ee232cff59b4fdc63da6d897e428500ed7cd312d40dbd218b76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe26bcb5e6d27cf5d8320dcc2397c5a4
SHA1b6a8b760639c19d8abd1666a0cd4c221b0b4ebcd
SHA2563e1f06c26bcee30be4336ddd63871c46aeed6e5139f800f240ff9df3d655bd34
SHA512460376075d03018b60a463903fc808582cc837657e5826e293a4ec110468e3f8e8ff2279144b4f36f8a6375d186ef420819152b1dfa316c1ad984d909272c0d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ac5ccc5eef6a664e98b2b210e3055c8
SHA11df9091e4b3b5e0d24671e2238145a44d113f929
SHA2564079fb4258aae5077a3139223ca05aa11686acbc175615518b1097ac14be4b76
SHA5125df4de3c8955dcb885498c6bc226c8fe947b531fccc1d40de6805ce7eae73a916ae6990f1ef0141b016de37ef68d35ff27ad45fd0e8393c5bcc417ef1d79778f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541806aa9d11cbc130d0ed2395dde4d07
SHA1ca73fd22ff7c5b4afaa34f5ce160fd93f4546d73
SHA2562e563505e86e0c346a60700e53b005cc604c93f9d9027988e320392c7a862bdf
SHA5120a6b7524761d55960060b805ca6da202e68fa83d9e9fd7b3d5647f0e991b8040c0096c4597f7e4a98f70b51cb1d04ee425641c94f71526340c813de8f90c56b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db4d80edbbae5e5fc671bb3ffdfa4eff
SHA115186cb9cdf08759f8c7da2ae3b6e49d439b8edd
SHA256ebe4ba9ce94dc95cfe405bb151960d8a3cdc3107515e0ab418d51f92876322d6
SHA512a3851db9f930ba8973336981d2c5f2b47338604b11a1857f44e24ac12b8f4e9a883947e00176242f5ae2ceb4393b823afd45c34723593fcf120eb1c577dff525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8b83a03edfc946840e8817ba86acddb
SHA1c7d3d7db32b1417f328b79bfbe36f55e814707ed
SHA25678a4d6d17622760a556f30433c373f01b53a11feef170c589d80de37acf3bba0
SHA5123ae1b643da9b1af2db8e1d25c3a8c06cdb4ca16ff9f9ba0df31283dac887054a582b5fe63c16ef8ceb901cbc9e4994c71d5f15490d43e4a2429b0e1356d30fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2cfab6e3a0b19a8a9da47e900e58759
SHA112c318013b0776eec4695ead803d11b21cec7cb7
SHA2565b4786a1f23ee94d02ef48a03f60cc8ebcc906308f73268a39577709644a6ab7
SHA51212777582fb8f525c2bcf472d175015ba903d545b643727e72c4ebd7439cbf5655e9492144cce95f12917044233966a706678431994822d2c3bc30a653aa6d5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525e7844d362f8a7c390501d8e729c3da
SHA1554f75344c867f2533c01d699b2d865721ed96cb
SHA25624903a427597a8cec14738e898d188283ae23e659e389911337928c6742cdc73
SHA512732776fc12dd97bfe451b6c1137090d33ad77fd37a2d29a4a7d6c4de067b77cd3fd6813c283da0841e1956f368938c96fc8134e7d05c6ab951c94527b47bf5fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a912b88c8af296aeb98e7f747b02eb3d
SHA15e034a0f5926300699df196390c5f0cac1859209
SHA2562180ffe52a3cc619f29e5dd7d841a47bc7d37bf3e554ac206475e77eb8b0f4db
SHA5120eb861f8e2cc3558fbf7d6c868e92ed7ec32f008574bdef0bfcace364fab8946c24aa038fc7d8aa98ee4ffc0652c7f3ebaa1e6b7489d096401a362c5fe197fd4
-
Filesize
10KB
MD5786d8761c3191243ea2c7580c7b82ebe
SHA11c0d3b4022bfc181a3933813aef97640a2fe300b
SHA256c866481e5c4646fb8b1fab1f30b75b82d0c3f9a08b022097ecf7903415c64dda
SHA512eadcce522953f61b6752728e5b7ad0a92320545e8b56ed4eaf55ec6a26f287d1879a51144bb97f79087c31c116214ac76570c5a79828128b7b626200061b08c1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RONDWLKG\favicon[2].ico
Filesize6KB
MD572f13fa5f987ea923a68a818d38fb540
SHA1f014620d35787fcfdef193c20bb383f5655b9e1e
SHA25637127c1a29c164cdaa75ec72ae685094c2468fe0577f743cb1f307d23dd35ec1
SHA512b66af0b6b95560c20584ed033547235d5188981a092131a7c1749926ba1ac208266193bd7fa8a3403a39eee23fcdd53580e9533803d7f52df5fb01d508e292b3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U6AGJ71Z\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
3KB
MD55f9c0cecbcab436c27d2acc48b4166d2
SHA121090d425de6fe938fa7fd02cb9a4497c23fedaf
SHA256f78e5ab75a051ba54a504c28b29c0a23c2fa42db46517ed7cf1055103e3cf7a9
SHA5121d7745d0d9b98e40da1409be01d9ac757b16e98cc8daa70f657dc1447aee3304fa843789cae33c491b72680a35821d4b0a618e35926fc7c513955f377a671511
-
Filesize
603B
MD5515b5c51cc9253d9bf03b7f538a4ddec
SHA134a6d109404f4d371140f5f2d48be8bf72acc52f
SHA2562fac0a68b51380106528b83419be913c9da55c53d71a7f2d0bfdf6c729fabfdf
SHA512027f4f4006fabfbc9051f1f1f29ad6c551bdf54a1294f092b087aae7c5d37867738efcdde57594803729fcb9411614de13302f843167ed39c4ecd96db7f47b8b