Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.exe
Resource
win10v2004-20231127-en
General
-
Target
3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.exe
-
Size
6.9MB
-
MD5
5745044a16eceed73253ae2449880cac
-
SHA1
9cb5883afaefbcea92ed5fd63050c4a2be3a680f
-
SHA256
3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2
-
SHA512
fdd99c627fef48b6d8477449c6d6316e4d3a022aebd3ccb4c36b85281926f73e096d4db5fc908041caff77a24d67684cb7013f738d8a15079c16db17dff9b297
-
SSDEEP
196608:jH/2cOhoGEpX+jRFRvz29jgM7+3Utny3r/mvZO0agzj:acOhoGE1ArRvqlgM7xtAT0Hzj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp 2724 wmaformat.exe 4388 wmaformat.exe -
Loads dropped DLL 3 IoCs
pid Process 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 141.98.234.31 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\WMAFormat\wmaformat.exe 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-OUTC1.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-K86PE.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-MBE5L.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-PHQC6.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-OTTB6.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\lessmsi\is-9908C.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-S5MDK.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-L9QL6.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-MO38A.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-75AU0.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-7FGSM.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4UEA7.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-AK9QN.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-AKCN4.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-6BVNE.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-0JMMD.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-EC6V8.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-IE4V4.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4EPV0.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-EA3P7.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-GQDK1.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-VVA9S.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-QVDJK.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-HOKT9.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-LAOLN.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-646S2.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\is-AEH9B.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-PU3DC.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-0RO4V.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-V5N2D.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\is-5KJPB.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File opened for modification C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-IP69E.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-PPBT0.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-SA1NR.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-G71V8.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-9TVRS.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-7DAAC.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-HC9UQ.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-AH7FM.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-0LG5B.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4H1G1.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-1CQ6B.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-0OBCQ.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-LHHVO.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-G9KB4.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-V3U3G.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-52VTI.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-187UB.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-095AJ.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-OHQFQ.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-CMEN4.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-5NBJ8.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-FLILG.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-1BP7Q.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-S0MPM.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-1J4H8.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-H8K2T.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-3JUC3.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-GPIJP.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-1A4FF.tmp 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1300 wrote to memory of 1316 1300 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.exe 50 PID 1300 wrote to memory of 1316 1300 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.exe 50 PID 1300 wrote to memory of 1316 1300 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.exe 50 PID 1316 wrote to memory of 5052 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp 92 PID 1316 wrote to memory of 5052 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp 92 PID 1316 wrote to memory of 5052 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp 92 PID 1316 wrote to memory of 2724 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp 90 PID 1316 wrote to memory of 2724 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp 90 PID 1316 wrote to memory of 2724 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp 90 PID 1316 wrote to memory of 3764 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp 96 PID 1316 wrote to memory of 3764 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp 96 PID 1316 wrote to memory of 3764 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp 96 PID 1316 wrote to memory of 4388 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp 94 PID 1316 wrote to memory of 4388 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp 94 PID 1316 wrote to memory of 4388 1316 3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp 94 PID 3764 wrote to memory of 4852 3764 net.exe 95 PID 3764 wrote to memory of 4852 3764 net.exe 95 PID 3764 wrote to memory of 4852 3764 net.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.exe"C:\Users\Admin\AppData\Local\Temp\3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\is-ERAE8.tmp\3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp"C:\Users\Admin\AppData\Local\Temp\is-ERAE8.tmp\3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp" /SL5="$90058,6982471,68096,C:\Users\Admin\AppData\Local\Temp\3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i3⤵
- Executes dropped EXE
PID:2724
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:5052
-
-
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s3⤵
- Executes dropped EXE
PID:4388
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 113⤵
- Suspicious use of WriteProcessMemory
PID:3764
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 111⤵PID:4852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5d8c92026448d6385831f875d0faff218
SHA1eac98f4dbf8543e22800b3300da2b4a181c32a1a
SHA256522fbc56005609159179717da3fc515a3e12780f478ba4d919023f0131234c3b
SHA512e3adc2887670e1e5bcd9e93f654efa56539163194f144c4d0c2c62b42d50f26ea38eeaf4fc22427cde08a8b6e63b8b1d7914139a8e4ddbf7dd7c73be22019d3e
-
Filesize
56KB
MD5ad8e8b7e30c6f4b546746bfb91c5426c
SHA1d8192269cbdc0394fa8f750d03716c654bcf309d
SHA2560782d91ad51f7fa71491660f9e3f369cc2ed823eae147b67570a44d613aefee2
SHA512ff16fc981ff5f7f494851bf5b799206f819fc7e08a5f8cc40632cfd52cad6834dcb3f73ab98cca7b8c9b600f190e64a0e1ab16ec89009d504aa132a73bd7bbf0
-
Filesize
43KB
MD5f85df30a11fab67d32e44b70f81c22b8
SHA13847ecde60760015b5af4474cbd9d63959479a28
SHA2560949b9a54979b8b28ddf70d06a50a2513fe385e6844717a9dddcdebe61dce195
SHA512add8b50354484bfffabfa8a55a7cc05f7a0d623c0ad85b676b2419d5218ac1a62596a7f7654d28debafb7372beda3e24473aab491c06eccfdc1a7ab0856a7648
-
C:\Users\Admin\AppData\Local\Temp\is-ERAE8.tmp\3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp
Filesize618KB
MD5aac1a0db045a8ae9209a0fa40e1efa15
SHA1d8db98f9331f116d862f080a0584246d68349f5f
SHA256331a30d42e9b864fb831654d2ce1b687981e74feed9162aa8593778b350a3b0a
SHA5120f65ed93db26bc51375e152875bc38185e3680e4826e3ed85dd29af65277525567f0c58c53b8e70f639110ca8ef95165d4bda640f3c25308740ebe74bb0150fd
-
C:\Users\Admin\AppData\Local\Temp\is-ERAE8.tmp\3493a9daf9528b40a5fa73f58cbed0596c56e679f5ae9a4286751ffbecf9f2c2.tmp
Filesize616KB
MD5e976ab05312d09ebaeaad90457032e16
SHA1b0f44fa09a422e5296b6d8694e9c0b38352e9be8
SHA25673cebe1a3c0712e598a22791efaf488caa753ae56a6c9043940a48d05bf20553
SHA512a0e9591df236e800d60e91bf3470e192f9a9c9afb17d3dd81c2d3d4eaf5bbcadfa81d4df2fee346939fd815ca3a086b78e585a2f0b084bdd3e60f9cd97a7e9c3
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303