Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 19:42
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
General
-
Target
file.exe
-
Size
1.2MB
-
MD5
a79a767672eae92b48d6d932a2ab33b5
-
SHA1
32724d656ae5eb860eebe7bfcdef8d7632ff8785
-
SHA256
6e9519128d86d74d2ad45ac6d3163e46c6a382e31ad49e92e44249ee228284c3
-
SHA512
cd194dbf3cb95a377341ca33333be6400a07a1d7e7f5d2073937dc7c74a36536881148a58084149c9f32a6e8245271844e56c57f894deace1640923d67f9237b
-
SSDEEP
24576:ry/K4dhrM5cvYAuQ2GHMk0U/5v06QccGNDl5sk6KAsGrch:e/K4PJ1uwHMk0UhMTSNDILK7a
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1rF56Nq2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1rF56Nq2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1rF56Nq2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1rF56Nq2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1rF56Nq2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1rF56Nq2.exe -
Executes dropped EXE 5 IoCs
pid Process 108 yF7QF58.exe 1980 gG8HF22.exe 2148 Ox7xa63.exe 2812 1rF56Nq2.exe 2508 2ro3020.exe -
Loads dropped DLL 14 IoCs
pid Process 2324 file.exe 108 yF7QF58.exe 108 yF7QF58.exe 1980 gG8HF22.exe 1980 gG8HF22.exe 2148 Ox7xa63.exe 2148 Ox7xa63.exe 2812 1rF56Nq2.exe 2148 Ox7xa63.exe 2508 2ro3020.exe 1964 WerFault.exe 1964 WerFault.exe 1964 WerFault.exe 1964 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 1rF56Nq2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1rF56Nq2.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" yF7QF58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" gG8HF22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Ox7xa63.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2508 set thread context of 3040 2508 2ro3020.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 1964 2508 WerFault.exe 32 2244 3040 WerFault.exe 33 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2812 1rF56Nq2.exe 2812 1rF56Nq2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2812 1rF56Nq2.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2324 wrote to memory of 108 2324 file.exe 28 PID 2324 wrote to memory of 108 2324 file.exe 28 PID 2324 wrote to memory of 108 2324 file.exe 28 PID 2324 wrote to memory of 108 2324 file.exe 28 PID 2324 wrote to memory of 108 2324 file.exe 28 PID 2324 wrote to memory of 108 2324 file.exe 28 PID 2324 wrote to memory of 108 2324 file.exe 28 PID 108 wrote to memory of 1980 108 yF7QF58.exe 29 PID 108 wrote to memory of 1980 108 yF7QF58.exe 29 PID 108 wrote to memory of 1980 108 yF7QF58.exe 29 PID 108 wrote to memory of 1980 108 yF7QF58.exe 29 PID 108 wrote to memory of 1980 108 yF7QF58.exe 29 PID 108 wrote to memory of 1980 108 yF7QF58.exe 29 PID 108 wrote to memory of 1980 108 yF7QF58.exe 29 PID 1980 wrote to memory of 2148 1980 gG8HF22.exe 30 PID 1980 wrote to memory of 2148 1980 gG8HF22.exe 30 PID 1980 wrote to memory of 2148 1980 gG8HF22.exe 30 PID 1980 wrote to memory of 2148 1980 gG8HF22.exe 30 PID 1980 wrote to memory of 2148 1980 gG8HF22.exe 30 PID 1980 wrote to memory of 2148 1980 gG8HF22.exe 30 PID 1980 wrote to memory of 2148 1980 gG8HF22.exe 30 PID 2148 wrote to memory of 2812 2148 Ox7xa63.exe 31 PID 2148 wrote to memory of 2812 2148 Ox7xa63.exe 31 PID 2148 wrote to memory of 2812 2148 Ox7xa63.exe 31 PID 2148 wrote to memory of 2812 2148 Ox7xa63.exe 31 PID 2148 wrote to memory of 2812 2148 Ox7xa63.exe 31 PID 2148 wrote to memory of 2812 2148 Ox7xa63.exe 31 PID 2148 wrote to memory of 2812 2148 Ox7xa63.exe 31 PID 2148 wrote to memory of 2508 2148 Ox7xa63.exe 32 PID 2148 wrote to memory of 2508 2148 Ox7xa63.exe 32 PID 2148 wrote to memory of 2508 2148 Ox7xa63.exe 32 PID 2148 wrote to memory of 2508 2148 Ox7xa63.exe 32 PID 2148 wrote to memory of 2508 2148 Ox7xa63.exe 32 PID 2148 wrote to memory of 2508 2148 Ox7xa63.exe 32 PID 2148 wrote to memory of 2508 2148 Ox7xa63.exe 32 PID 2508 wrote to memory of 3040 2508 2ro3020.exe 33 PID 2508 wrote to memory of 3040 2508 2ro3020.exe 33 PID 2508 wrote to memory of 3040 2508 2ro3020.exe 33 PID 2508 wrote to memory of 3040 2508 2ro3020.exe 33 PID 2508 wrote to memory of 3040 2508 2ro3020.exe 33 PID 2508 wrote to memory of 3040 2508 2ro3020.exe 33 PID 2508 wrote to memory of 3040 2508 2ro3020.exe 33 PID 2508 wrote to memory of 3040 2508 2ro3020.exe 33 PID 2508 wrote to memory of 3040 2508 2ro3020.exe 33 PID 2508 wrote to memory of 3040 2508 2ro3020.exe 33 PID 2508 wrote to memory of 3040 2508 2ro3020.exe 33 PID 2508 wrote to memory of 3040 2508 2ro3020.exe 33 PID 2508 wrote to memory of 3040 2508 2ro3020.exe 33 PID 2508 wrote to memory of 3040 2508 2ro3020.exe 33 PID 3040 wrote to memory of 2244 3040 AppLaunch.exe 35 PID 3040 wrote to memory of 2244 3040 AppLaunch.exe 35 PID 3040 wrote to memory of 2244 3040 AppLaunch.exe 35 PID 3040 wrote to memory of 2244 3040 AppLaunch.exe 35 PID 3040 wrote to memory of 2244 3040 AppLaunch.exe 35 PID 3040 wrote to memory of 2244 3040 AppLaunch.exe 35 PID 3040 wrote to memory of 2244 3040 AppLaunch.exe 35 PID 2508 wrote to memory of 1964 2508 2ro3020.exe 34 PID 2508 wrote to memory of 1964 2508 2ro3020.exe 34 PID 2508 wrote to memory of 1964 2508 2ro3020.exe 34 PID 2508 wrote to memory of 1964 2508 2ro3020.exe 34 PID 2508 wrote to memory of 1964 2508 2ro3020.exe 34 PID 2508 wrote to memory of 1964 2508 2ro3020.exe 34 PID 2508 wrote to memory of 1964 2508 2ro3020.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yF7QF58.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yF7QF58.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gG8HF22.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\gG8HF22.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ox7xa63.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ox7xa63.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1rF56Nq2.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1rF56Nq2.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ro3020.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2ro3020.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 2687⤵
- Program crash
PID:2244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 2846⤵
- Loads dropped DLL
- Program crash
PID:1964
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5a897b6c0ffd4e2e3e90dd9c961eee6d9
SHA1a09544b8add5537a5c320f28481b9350ba815868
SHA256da08d003ec03eb9b64856eef7b6302941dc0cf4cdcf5bfa9fe94b59a0e32bad9
SHA512446f3ed7c17ead5fdec81ec27ff43f798f38cd247ae02dd99903f8506bc086e008b152f5cf6375416cd5bc13f3804a6dae1808064d8e0805b7255cef9237bd07
-
Filesize
1.0MB
MD5a897b6c0ffd4e2e3e90dd9c961eee6d9
SHA1a09544b8add5537a5c320f28481b9350ba815868
SHA256da08d003ec03eb9b64856eef7b6302941dc0cf4cdcf5bfa9fe94b59a0e32bad9
SHA512446f3ed7c17ead5fdec81ec27ff43f798f38cd247ae02dd99903f8506bc086e008b152f5cf6375416cd5bc13f3804a6dae1808064d8e0805b7255cef9237bd07
-
Filesize
746KB
MD5c6d152fe3a48cc56724517f283dcc247
SHA1a72eb0baf976bf3a992dc916fdbde419b1ac1265
SHA2563e2e2ac4f7e41c4cd9396d56ef1254cf70f8182683c75283cd16fcc29b71c70e
SHA512384582697b943c9ede175860c0b7d8ca5056c09f624f35a3c4debba614bac63a4d6dadb7cefcc26eed15dd34d2af5fb6861ebbfca521fc52c7a07bc67872a89d
-
Filesize
746KB
MD5c6d152fe3a48cc56724517f283dcc247
SHA1a72eb0baf976bf3a992dc916fdbde419b1ac1265
SHA2563e2e2ac4f7e41c4cd9396d56ef1254cf70f8182683c75283cd16fcc29b71c70e
SHA512384582697b943c9ede175860c0b7d8ca5056c09f624f35a3c4debba614bac63a4d6dadb7cefcc26eed15dd34d2af5fb6861ebbfca521fc52c7a07bc67872a89d
-
Filesize
494KB
MD560e3542e86ccbfef82491a7d3024f228
SHA1d3e246aae1040b1a143933a629278bb7fc3b52ec
SHA2569945a95db1562ae82bf72cff59b3fb10260e6009d270381a65e76e195100c06e
SHA512247590768657cb6f0cfeb9635c839ce42522536c9e44c19c8e771c1d04e23699f3ce09f7d025354e818c32dface25542e6dbca85164ca803891d1598d243426e
-
Filesize
494KB
MD560e3542e86ccbfef82491a7d3024f228
SHA1d3e246aae1040b1a143933a629278bb7fc3b52ec
SHA2569945a95db1562ae82bf72cff59b3fb10260e6009d270381a65e76e195100c06e
SHA512247590768657cb6f0cfeb9635c839ce42522536c9e44c19c8e771c1d04e23699f3ce09f7d025354e818c32dface25542e6dbca85164ca803891d1598d243426e
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
449KB
MD5920edab773bef6447eb20cfc65b25c37
SHA146950139c99f47a38dba790ff04693bfa450d94b
SHA2566b62456c6e43af8ec172f55e61e7cf92892d7b5bf7f2dfb5616ae5da741ca513
SHA51231f75eeea7fc36635f358f0a06004090cb9f4985f69e434e8d0ca3dd170a075e15596cfc69788b9143f36af271367a0f29232da24009c4732031089fb98eb766
-
Filesize
449KB
MD5920edab773bef6447eb20cfc65b25c37
SHA146950139c99f47a38dba790ff04693bfa450d94b
SHA2566b62456c6e43af8ec172f55e61e7cf92892d7b5bf7f2dfb5616ae5da741ca513
SHA51231f75eeea7fc36635f358f0a06004090cb9f4985f69e434e8d0ca3dd170a075e15596cfc69788b9143f36af271367a0f29232da24009c4732031089fb98eb766
-
Filesize
1.0MB
MD5a897b6c0ffd4e2e3e90dd9c961eee6d9
SHA1a09544b8add5537a5c320f28481b9350ba815868
SHA256da08d003ec03eb9b64856eef7b6302941dc0cf4cdcf5bfa9fe94b59a0e32bad9
SHA512446f3ed7c17ead5fdec81ec27ff43f798f38cd247ae02dd99903f8506bc086e008b152f5cf6375416cd5bc13f3804a6dae1808064d8e0805b7255cef9237bd07
-
Filesize
1.0MB
MD5a897b6c0ffd4e2e3e90dd9c961eee6d9
SHA1a09544b8add5537a5c320f28481b9350ba815868
SHA256da08d003ec03eb9b64856eef7b6302941dc0cf4cdcf5bfa9fe94b59a0e32bad9
SHA512446f3ed7c17ead5fdec81ec27ff43f798f38cd247ae02dd99903f8506bc086e008b152f5cf6375416cd5bc13f3804a6dae1808064d8e0805b7255cef9237bd07
-
Filesize
746KB
MD5c6d152fe3a48cc56724517f283dcc247
SHA1a72eb0baf976bf3a992dc916fdbde419b1ac1265
SHA2563e2e2ac4f7e41c4cd9396d56ef1254cf70f8182683c75283cd16fcc29b71c70e
SHA512384582697b943c9ede175860c0b7d8ca5056c09f624f35a3c4debba614bac63a4d6dadb7cefcc26eed15dd34d2af5fb6861ebbfca521fc52c7a07bc67872a89d
-
Filesize
746KB
MD5c6d152fe3a48cc56724517f283dcc247
SHA1a72eb0baf976bf3a992dc916fdbde419b1ac1265
SHA2563e2e2ac4f7e41c4cd9396d56ef1254cf70f8182683c75283cd16fcc29b71c70e
SHA512384582697b943c9ede175860c0b7d8ca5056c09f624f35a3c4debba614bac63a4d6dadb7cefcc26eed15dd34d2af5fb6861ebbfca521fc52c7a07bc67872a89d
-
Filesize
494KB
MD560e3542e86ccbfef82491a7d3024f228
SHA1d3e246aae1040b1a143933a629278bb7fc3b52ec
SHA2569945a95db1562ae82bf72cff59b3fb10260e6009d270381a65e76e195100c06e
SHA512247590768657cb6f0cfeb9635c839ce42522536c9e44c19c8e771c1d04e23699f3ce09f7d025354e818c32dface25542e6dbca85164ca803891d1598d243426e
-
Filesize
494KB
MD560e3542e86ccbfef82491a7d3024f228
SHA1d3e246aae1040b1a143933a629278bb7fc3b52ec
SHA2569945a95db1562ae82bf72cff59b3fb10260e6009d270381a65e76e195100c06e
SHA512247590768657cb6f0cfeb9635c839ce42522536c9e44c19c8e771c1d04e23699f3ce09f7d025354e818c32dface25542e6dbca85164ca803891d1598d243426e
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
194KB
MD56241b03d68a610324ecda52f0f84e287
SHA1da80280b6e3925e455925efd6c6e59a6118269c4
SHA256ec74de9416b8ef2c3bdb1a9835e54548b3185524210d1aeffa91c98f74f751e2
SHA512a60fe447cb0bed8e6cbd7c344b19a4602553209cbda7a40993f0fdf01e096bda4b79de0b528ecebf2efa0007f81d7bd6c7ef84252b2a160c93d642a78f0095f9
-
Filesize
449KB
MD5920edab773bef6447eb20cfc65b25c37
SHA146950139c99f47a38dba790ff04693bfa450d94b
SHA2566b62456c6e43af8ec172f55e61e7cf92892d7b5bf7f2dfb5616ae5da741ca513
SHA51231f75eeea7fc36635f358f0a06004090cb9f4985f69e434e8d0ca3dd170a075e15596cfc69788b9143f36af271367a0f29232da24009c4732031089fb98eb766
-
Filesize
449KB
MD5920edab773bef6447eb20cfc65b25c37
SHA146950139c99f47a38dba790ff04693bfa450d94b
SHA2566b62456c6e43af8ec172f55e61e7cf92892d7b5bf7f2dfb5616ae5da741ca513
SHA51231f75eeea7fc36635f358f0a06004090cb9f4985f69e434e8d0ca3dd170a075e15596cfc69788b9143f36af271367a0f29232da24009c4732031089fb98eb766
-
Filesize
449KB
MD5920edab773bef6447eb20cfc65b25c37
SHA146950139c99f47a38dba790ff04693bfa450d94b
SHA2566b62456c6e43af8ec172f55e61e7cf92892d7b5bf7f2dfb5616ae5da741ca513
SHA51231f75eeea7fc36635f358f0a06004090cb9f4985f69e434e8d0ca3dd170a075e15596cfc69788b9143f36af271367a0f29232da24009c4732031089fb98eb766
-
Filesize
449KB
MD5920edab773bef6447eb20cfc65b25c37
SHA146950139c99f47a38dba790ff04693bfa450d94b
SHA2566b62456c6e43af8ec172f55e61e7cf92892d7b5bf7f2dfb5616ae5da741ca513
SHA51231f75eeea7fc36635f358f0a06004090cb9f4985f69e434e8d0ca3dd170a075e15596cfc69788b9143f36af271367a0f29232da24009c4732031089fb98eb766
-
Filesize
449KB
MD5920edab773bef6447eb20cfc65b25c37
SHA146950139c99f47a38dba790ff04693bfa450d94b
SHA2566b62456c6e43af8ec172f55e61e7cf92892d7b5bf7f2dfb5616ae5da741ca513
SHA51231f75eeea7fc36635f358f0a06004090cb9f4985f69e434e8d0ca3dd170a075e15596cfc69788b9143f36af271367a0f29232da24009c4732031089fb98eb766
-
Filesize
449KB
MD5920edab773bef6447eb20cfc65b25c37
SHA146950139c99f47a38dba790ff04693bfa450d94b
SHA2566b62456c6e43af8ec172f55e61e7cf92892d7b5bf7f2dfb5616ae5da741ca513
SHA51231f75eeea7fc36635f358f0a06004090cb9f4985f69e434e8d0ca3dd170a075e15596cfc69788b9143f36af271367a0f29232da24009c4732031089fb98eb766