Analysis
-
max time kernel
144s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
11/12/2023, 11:04
Static task
static1
Behavioral task
behavioral1
Sample
64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.exe
Resource
win10-20231023-en
General
-
Target
64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.exe
-
Size
6.9MB
-
MD5
ea73617cc2ffac38efe67bd80c229382
-
SHA1
91c3a9d0d1e10088acca664af40ca7d67070d12d
-
SHA256
64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72
-
SHA512
251d422d0f4c27974fa4fd28f4ac18880e8ac35c7dd5f4a893fa5102843befe5e66d8dc2adb787dc18b406dc4a13c4933dbe18cba1cd738d3f3dc48df3170411
-
SSDEEP
98304:PzyQ4kc+v4jvDhsQepuwmrkz216aPE8d9X+X1M2CX27eGqc6hxTGZtsAzFjTidLb:mQ4PTP94zHQ9OX1M2CGjn6hDc6LKEzj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp 2268 wmaformat.exe 4836 wmaformat.exe -
Loads dropped DLL 3 IoCs
pid Process 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 81.31.197.38 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 63 IoCs
description ioc Process File created C:\Program Files (x86)\WMAFormat\bin\x86\is-MG370.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\lessmsi\is-LGQRU.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-S0MAB.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-OLG8V.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-JSGBR.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-DMOEI.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-VBD82.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-R3H0B.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-10NO1.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-FUVMN.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-OQMAG.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-5M617.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-9QDRH.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-ON51N.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-PORLJ.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-RIBLC.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-RPTQP.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-CHPGH.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-5142N.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-PUBHF.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-2GV2C.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-E28JQ.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-QMLGR.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-K9AU4.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File opened for modification C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-LREJL.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-G09GT.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-F2659.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-7ROHR.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-BB380.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-03GNK.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-910H5.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-560B3.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-GUIB3.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-TIEIM.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4JV75.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-5O41N.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-SJRG9.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-D350M.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-RH7V7.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-E7EIP.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-44GVC.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-QL84P.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File opened for modification C:\Program Files (x86)\WMAFormat\wmaformat.exe 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-OO7JP.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4AD6V.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\plugins\internal\is-VFSS3.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-IQN24.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-ATH11.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-4PM54.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-6ES0K.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-UA5Q3.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-R6HAF.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-GS68N.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\is-7L3SF.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\stuff\is-8NNK1.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-61MEC.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\is-5F2SK.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\uninstall\unins000.dat 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-96SD4.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-ENNSB.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-B1UKS.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp File created C:\Program Files (x86)\WMAFormat\bin\x86\is-LJ702.tmp 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp -
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1296 wrote to memory of 1756 1296 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.exe 71 PID 1296 wrote to memory of 1756 1296 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.exe 71 PID 1296 wrote to memory of 1756 1296 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.exe 71 PID 1756 wrote to memory of 3112 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp 72 PID 1756 wrote to memory of 3112 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp 72 PID 1756 wrote to memory of 3112 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp 72 PID 1756 wrote to memory of 2268 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp 74 PID 1756 wrote to memory of 2268 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp 74 PID 1756 wrote to memory of 2268 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp 74 PID 1756 wrote to memory of 1584 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp 76 PID 1756 wrote to memory of 1584 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp 76 PID 1756 wrote to memory of 1584 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp 76 PID 1756 wrote to memory of 4836 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp 75 PID 1756 wrote to memory of 4836 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp 75 PID 1756 wrote to memory of 4836 1756 64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp 75 PID 1584 wrote to memory of 4652 1584 net.exe 78 PID 1584 wrote to memory of 4652 1584 net.exe 78 PID 1584 wrote to memory of 4652 1584 net.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.exe"C:\Users\Admin\AppData\Local\Temp\64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\is-NDJ4D.tmp\64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp"C:\Users\Admin\AppData\Local\Temp\is-NDJ4D.tmp\64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp" /SL5="$70200,6985458,68096,C:\Users\Admin\AppData\Local\Temp\64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Query3⤵PID:3112
-
-
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -i3⤵
- Executes dropped EXE
PID:2268
-
-
C:\Program Files (x86)\WMAFormat\wmaformat.exe"C:\Program Files (x86)\WMAFormat\wmaformat.exe" -s3⤵
- Executes dropped EXE
PID:4836
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 113⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 114⤵PID:4652
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5d2ffc5aebef04fbf95c92c7af96d8483
SHA1900f0e1583c45f6816497cbc0b0831183df3af99
SHA256a1ab140efe6d887de35ac3e53bfa6257e0ef624ad7bc698fe33c993147459050
SHA51240a88b843d1dc759a05d7c669808b0da202c6cc423795efe43815bd510486e155676756ff8fbc406e21e7b7af685618957bcff2ac1427ccf17f27873b6a668c0
-
Filesize
1.1MB
MD5372876930f769fb399fe687e35ac5905
SHA174c042484b8402811db34fc9b57858f5a88018ac
SHA256f531b13e9f2805c3c46a225a435ae98e1caf91c949814d44bf7cc57991957a1e
SHA512a2b0fa6ce7247aff329cc6b1336e9f61e2a65bfe8e064cae1723f145aae1468575036a3c382e82415c28908c12b4b0d0447a242bfcd8cc28d72411054ec607d9
-
Filesize
193KB
MD5419156bb97cdf17dc7f14d3682f08613
SHA16bcc9811e21fb9cd8994835bc8cdaf6646dff1a1
SHA2561225424598409e628bb0b58839586e95ab6283d22fc343adffeec154c4746cf6
SHA512575c0c6fc1bcdb7cd10d563408d6abfec8e2b0e9ce9033ac7f0c1376ccefb9d15009098d5f5511b5fd857abcfdda1ced1c479466160fe13ee2d39d3c040b0a9e
-
C:\Users\Admin\AppData\Local\Temp\is-NDJ4D.tmp\64e6e0cfaf00d9a14bd7ffa3d7878abdaab4deed4bcdba1eff97b45f894e4a72.tmp
Filesize687KB
MD5f448d7f4b76e5c9c3a4eaff16a8b9b73
SHA131808f1ffa84c954376975b7cdb0007e6b762488
SHA2567233b85eb0f8b3aa5cae3811d727aa8742fec4d1091c120a0fe15006f424cc49
SHA512f8197458cd2764c0b852dac34f9bf361110a7dc86903024a97c7bcd3f77b148342bf45e3c2b60f6af8198ae3b83938dbaad5e007d71a0f88006f3a0618cf36f4
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD53adaa386b671c2df3bae5b39dc093008
SHA1067cf95fbdb922d81db58432c46930f86d23dded
SHA25671cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38
SHA512bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303