Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 17:12
Static task
static1
Behavioral task
behavioral1
Sample
7f7ca983831cdfc28bd691d92ffba5aa.exe
Resource
win7-20231215-en
General
-
Target
7f7ca983831cdfc28bd691d92ffba5aa.exe
-
Size
313KB
-
MD5
7f7ca983831cdfc28bd691d92ffba5aa
-
SHA1
79bbb0ad0238057e48d67467124943913a2d515e
-
SHA256
91b4d0eaf53864f2a3d4da0d5798d25bf9359ca5b5a0f09e3964bc03368c52fe
-
SHA512
45f9208a45a2711b4b96359dca95c1baee286681190b11abe7e5fdef612fd1f338f77ddb9d4cba76f202a36c2fed08155c9b68e37ec14b83782b6d8124fa24a3
-
SSDEEP
6144:91OgDPdkBAFZWjadD4su9pFyXGnyw23No1ncADgFxc0ygfenvOFpgqdEVHr7:91OgLdaL9p4XGb23WnLDgFxLAIpDdEVv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2892 setup.exe -
Loads dropped DLL 6 IoCs
pid Process 2964 7f7ca983831cdfc28bd691d92ffba5aa.exe 2892 setup.exe 2892 setup.exe 2892 setup.exe 2892 setup.exe 2892 setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}\NoExplorer = "1" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}\ = "wxDfast" setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x000500000001959f-30.dat nsis_installer_1 behavioral1/files/0x000500000001959f-30.dat nsis_installer_2 behavioral1/files/0x000500000001a031-99.dat nsis_installer_1 behavioral1/files/0x000500000001a031-99.dat nsis_installer_2 -
Modifies registry class 63 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}\InprocServer32\ThreadingModel = "Apartment" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR\ = "C:\\ProgramData\\wxDfast" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}\ = "wxDfast Class" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\ = "Injector 1.0 Type Library" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}\VersionIndependentProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}\InprocServer32\ = "C:\\ProgramData\\wxDfast\\bhoclass.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ = "ILocalStorage" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CLSID\ = "{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID\ = "{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\ = "wxDfast" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}\Programmable setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}\Programmable setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\Version = "1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}\ProgID setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\HELPDIR setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}\InprocServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\ = "wxDfast" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho.1.0\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer\ = "bhoclass.bho.1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}\VersionIndependentProgID\ = "bhoclass.bho" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\0\win32\ = "C:\\ProgramData\\wxDfast\\bhoclass.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\bhoclass.bho.bhoclass.bho\CurVer setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}\InprocServer32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ProxyStubClsid32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0\FLAGS\ = "0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\TypeLib\ = "{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}\ProgID\ = "bhoclass.bho.1.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC}\1.0 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}\ProgID setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6} setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C2CF0D01-7657-48AA-98C9-AE5E64757FCC} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6}\VersionIndependentProgID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BBA74401-6D6F-4BBD-9F65-E8623814F3BB}\ = "IInjectorBHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D2F39980-399F-492E-8D88-5FF7CCB3B47F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2892 2964 7f7ca983831cdfc28bd691d92ffba5aa.exe 28 PID 2964 wrote to memory of 2892 2964 7f7ca983831cdfc28bd691d92ffba5aa.exe 28 PID 2964 wrote to memory of 2892 2964 7f7ca983831cdfc28bd691d92ffba5aa.exe 28 PID 2964 wrote to memory of 2892 2964 7f7ca983831cdfc28bd691d92ffba5aa.exe 28 PID 2964 wrote to memory of 2892 2964 7f7ca983831cdfc28bd691d92ffba5aa.exe 28 PID 2964 wrote to memory of 2892 2964 7f7ca983831cdfc28bd691d92ffba5aa.exe 28 PID 2964 wrote to memory of 2892 2964 7f7ca983831cdfc28bd691d92ffba5aa.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{8BC16AD4-2D6D-86AC-79E3-C2370B179EB6} = "1" setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f7ca983831cdfc28bd691d92ffba5aa.exe"C:\Users\Admin\AppData\Local\Temp\7f7ca983831cdfc28bd691d92ffba5aa.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\7zS5580.tmp\setup.exe.\setup.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
- System policy modification
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5ac13c733379328f86568f6e514c2f7f8
SHA1338901240fedcef4e3892fd4c723c89154f4de05
SHA2567bf09b5c2a9b6348227199c1b3951b57907ca6a5c215a04ad8d5e43232f5b562
SHA51235f69a82694a2ea4268a3dde7940af6bd1c87a32d93a72723464f90e4e818805be9e80872469d1cc29150a9aac872fc78613a584baa1327dfa8478c2de5672c4
-
Filesize
599B
MD5e6bf1b2ddf2890d74849a542f9a6d4cc
SHA122523bdfba10266f57da61d38b99d7346d80be87
SHA256da1584410c5d6de975df89942f1557076cd5e95ab1a760a62d64137c6547dc43
SHA512f7e1d698a7f46632da9e3b68953b906c5f2a6cec97b4ab162d8066b0573a8ddbfe10236834522643f212800124d2c91251039630e3b7fed072bd27aa58663c19
-
Filesize
46KB
MD52628f4240552cc3b2ba04ee51078ae0c
SHA15b0cca662149240d1fd4354beac1338e97e334ea
SHA25603c965d0bd9827a978ef4080139533573aa800c9803599c0ce91da48506ad8f6
SHA5126ecfcc97126373e82f1edab47020979d7706fc2be39ca792e8f30595133cd762cd4a65a246bee9180713e40e61efa373ecfb5eb72501ee18b38f13e32e61793b
-
C:\Users\Admin\AppData\Local\Temp\7zS5580.tmp\[email protected]\chrome.manifest
Filesize114B
MD512a4636a65b83a6c8725ee7f65d14919
SHA170419c608722b1d49e8199c7c748a42041cf0ed1
SHA256e48b115cc56ec883376a03c01aab9c83812a300a641a5815a8d34ff23538b40b
SHA512a3536792c231f2ef1d34a7f7e1d07e1423243806d7cddc04a5307b49e806d5c1bcb8d5e7d47e455e9926728a7ca83f331ec161ac6b48bf871449a93b550a33c2
-
C:\Users\Admin\AppData\Local\Temp\7zS5580.tmp\[email protected]\content\indexeddb.js
Filesize1KB
MD53fef158a7e18c6a003f9842c49384710
SHA16e69b12cd301b1ee4d0595c29d86c06158c56175
SHA25679217eaef3ed5c760e66bbef7b8b30faecc523e522b51d55a32c51eaf82b4284
SHA512886e10aae65d41fc938bdc0e66490b7e0fb2d525a673cb140e17881a54b93b4a372f4894091cdb45ba18f31f18e5572b31e65474fb90fe601e5352707e607ae2
-
C:\Users\Admin\AppData\Local\Temp\7zS5580.tmp\[email protected]\content\jquery.js
Filesize91KB
MD54bab8348a52d17428f684ad1ec3a427e
SHA156c912a8c8561070aee7b9808c5f3b2abec40063
SHA2563739b485ac39b157caa066b883e4d9d3f74c50beff0b86cd8a24ce407b179a23
SHA512a693069c66d8316d73a3c01ed9e6a4553c9b92d98b294f0e170cc9f9f5502c814255f5f92b93aeb07e0d6fe4613f9a1d511e1bfd965634f04e6cf18f191a7480
-
C:\Users\Admin\AppData\Local\Temp\7zS5580.tmp\[email protected]\content\jsext.js
Filesize6KB
MD5c278aaf668d8366649d93facaca74e86
SHA16b9f13c3de26b61322ecf089bd443d16eac5f1b4
SHA25614d02286ef1c8c643961aa5dadb4f99d760b0de50e6b731a81665108f8977a0f
SHA512e9a898558cf043dc3056b3d6a9afe18366ed87d475fe3a0f92cc8a4dea84919a51e57e1d7ad5a8749012067c18cfb5a9110374d9a4308294fb833f9cabd219cc
-
C:\Users\Admin\AppData\Local\Temp\7zS5580.tmp\[email protected]\content\lsdb.js
Filesize1KB
MD5a3d5dabf8f2c094d3bb374a11c75fe6f
SHA1eb12daa1793c02359103a6437a2a2a6e17650705
SHA256e2cf8c1c29ed2cca59fa6856677da64ad7cc9a70a3dc031cb8f1298880eccbdd
SHA512d72af1a5a31c3b7b57a741d5f5bc0ae45b833e692d4598a327936f7c5b274093d5de5f134bbbd49de03863ed6598a4b90f9ccb8b28691412b012cca6cd3fd6b3
-
C:\Users\Admin\AppData\Local\Temp\7zS5580.tmp\[email protected]\content\sqlite.js
Filesize1KB
MD5d3a5173f2fd87f4be3197e3747e83d96
SHA15a5f114579433207e9678f0d1ac13294a0ead22a
SHA256d81b2f7f927728b6802adbd873842bc10734627f9815abe0286499d0bbef3792
SHA512e3805a7b90b949fd3d4687377308d1eee13f845d4ee49ef92bb87d3f1c778ec747467b6a977eed68e24cc5566105acbf9062c3f6c5a761ff776a9d71ea83eb4d
-
Filesize
5KB
MD53deeb1b4d7137b2b782d6ac45b086dd3
SHA1524c19996b160f04dd19a97eb3cd49de91a41465
SHA256dc6cc2ed70c273d96d1026c3b8f9367e958359bb7e9e00e751ffefd52cdfb9ce
SHA5123ce3fa5cfddda7127b0180f64bd2ad07316c4b155756d6b0a735a92465857089b9b797d1083c91a888f0a2f1ba686ca4836dd62fd71c9114f35c9966ade78dbc
-
Filesize
61KB
MD5201d2311011ffdf6c762fd46cdeb52ab
SHA165c474ca42a337745e288be0e21f43ceaafd5efe
SHA25615c0e4fd6091cda70fa308ea5ee956996f6eb23d24e44700bd5c74bf111cf2aa
SHA512235d70114f391d9e7a319d94bdfc49665d147723379de7487ef76cfc968f7faa3191153b32ba1ab466caeeeeef4852381529a168c3acca9a8d5a26dfe0436f6b