Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
473c7c2b5312e33799192b66183cc9de.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
473c7c2b5312e33799192b66183cc9de.exe
Resource
win10v2004-20231215-en
General
-
Target
473c7c2b5312e33799192b66183cc9de.exe
-
Size
512KB
-
MD5
473c7c2b5312e33799192b66183cc9de
-
SHA1
efc8a29120e6c57e6360eed84b0173d1683b7a5b
-
SHA256
17417d614536e55eec8bafb4a56b45c8000e7543f16b9cccc944d57fe07ca9b5
-
SHA512
271e64924d1af77788a72273d6d6cc1b9960a085262b76a4278b2f37f45cad61363cc2a259b929a538d8a59a3ae9bf0b09dff190d42b7ab6e3dcde2885b6a65c
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6t:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5y
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" dzpdrsqhet.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dzpdrsqhet.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dzpdrsqhet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" dzpdrsqhet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dzpdrsqhet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dzpdrsqhet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dzpdrsqhet.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" dzpdrsqhet.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 473c7c2b5312e33799192b66183cc9de.exe -
Executes dropped EXE 5 IoCs
pid Process 368 dzpdrsqhet.exe 3784 cmdxosojilonqgp.exe 4688 oezhughf.exe 1216 ouurigmcblorc.exe 4912 oezhughf.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dzpdrsqhet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dzpdrsqhet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dzpdrsqhet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" dzpdrsqhet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dzpdrsqhet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" dzpdrsqhet.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xgypican = "dzpdrsqhet.exe" cmdxosojilonqgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vlwqtjzn = "cmdxosojilonqgp.exe" cmdxosojilonqgp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "ouurigmcblorc.exe" cmdxosojilonqgp.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: oezhughf.exe File opened (read-only) \??\e: oezhughf.exe File opened (read-only) \??\n: oezhughf.exe File opened (read-only) \??\p: oezhughf.exe File opened (read-only) \??\t: oezhughf.exe File opened (read-only) \??\k: dzpdrsqhet.exe File opened (read-only) \??\s: dzpdrsqhet.exe File opened (read-only) \??\z: dzpdrsqhet.exe File opened (read-only) \??\v: oezhughf.exe File opened (read-only) \??\l: oezhughf.exe File opened (read-only) \??\u: oezhughf.exe File opened (read-only) \??\y: oezhughf.exe File opened (read-only) \??\m: dzpdrsqhet.exe File opened (read-only) \??\p: dzpdrsqhet.exe File opened (read-only) \??\t: dzpdrsqhet.exe File opened (read-only) \??\u: dzpdrsqhet.exe File opened (read-only) \??\b: oezhughf.exe File opened (read-only) \??\u: oezhughf.exe File opened (read-only) \??\o: dzpdrsqhet.exe File opened (read-only) \??\i: oezhughf.exe File opened (read-only) \??\i: dzpdrsqhet.exe File opened (read-only) \??\v: dzpdrsqhet.exe File opened (read-only) \??\g: oezhughf.exe File opened (read-only) \??\k: oezhughf.exe File opened (read-only) \??\p: oezhughf.exe File opened (read-only) \??\l: oezhughf.exe File opened (read-only) \??\w: oezhughf.exe File opened (read-only) \??\b: dzpdrsqhet.exe File opened (read-only) \??\w: dzpdrsqhet.exe File opened (read-only) \??\s: oezhughf.exe File opened (read-only) \??\s: oezhughf.exe File opened (read-only) \??\g: dzpdrsqhet.exe File opened (read-only) \??\j: dzpdrsqhet.exe File opened (read-only) \??\m: oezhughf.exe File opened (read-only) \??\n: oezhughf.exe File opened (read-only) \??\o: oezhughf.exe File opened (read-only) \??\j: oezhughf.exe File opened (read-only) \??\x: oezhughf.exe File opened (read-only) \??\l: dzpdrsqhet.exe File opened (read-only) \??\x: dzpdrsqhet.exe File opened (read-only) \??\q: oezhughf.exe File opened (read-only) \??\k: oezhughf.exe File opened (read-only) \??\z: oezhughf.exe File opened (read-only) \??\a: oezhughf.exe File opened (read-only) \??\w: oezhughf.exe File opened (read-only) \??\x: oezhughf.exe File opened (read-only) \??\y: oezhughf.exe File opened (read-only) \??\o: oezhughf.exe File opened (read-only) \??\r: oezhughf.exe File opened (read-only) \??\h: dzpdrsqhet.exe File opened (read-only) \??\h: oezhughf.exe File opened (read-only) \??\j: oezhughf.exe File opened (read-only) \??\r: oezhughf.exe File opened (read-only) \??\t: oezhughf.exe File opened (read-only) \??\h: oezhughf.exe File opened (read-only) \??\a: dzpdrsqhet.exe File opened (read-only) \??\n: dzpdrsqhet.exe File opened (read-only) \??\q: dzpdrsqhet.exe File opened (read-only) \??\r: dzpdrsqhet.exe File opened (read-only) \??\b: oezhughf.exe File opened (read-only) \??\i: oezhughf.exe File opened (read-only) \??\v: oezhughf.exe File opened (read-only) \??\y: dzpdrsqhet.exe File opened (read-only) \??\g: oezhughf.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" dzpdrsqhet.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" dzpdrsqhet.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4580-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral2/files/0x0007000000023205-19.dat autoit_exe behavioral2/files/0x0006000000023209-5.dat autoit_exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\dzpdrsqhet.exe 473c7c2b5312e33799192b66183cc9de.exe File opened for modification C:\Windows\SysWOW64\dzpdrsqhet.exe 473c7c2b5312e33799192b66183cc9de.exe File created C:\Windows\SysWOW64\cmdxosojilonqgp.exe 473c7c2b5312e33799192b66183cc9de.exe File opened for modification C:\Windows\SysWOW64\oezhughf.exe 473c7c2b5312e33799192b66183cc9de.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll dzpdrsqhet.exe File opened for modification C:\Windows\SysWOW64\cmdxosojilonqgp.exe 473c7c2b5312e33799192b66183cc9de.exe File created C:\Windows\SysWOW64\oezhughf.exe 473c7c2b5312e33799192b66183cc9de.exe File created C:\Windows\SysWOW64\ouurigmcblorc.exe 473c7c2b5312e33799192b66183cc9de.exe File opened for modification C:\Windows\SysWOW64\ouurigmcblorc.exe 473c7c2b5312e33799192b66183cc9de.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 473c7c2b5312e33799192b66183cc9de.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh dzpdrsqhet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg dzpdrsqhet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat dzpdrsqhet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" dzpdrsqhet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFEFC824F5C82139131D7207DE7BDEEE130594B67316245D7EE" 473c7c2b5312e33799192b66183cc9de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0866BB2FF6D22D8D279D0D48A789164" 473c7c2b5312e33799192b66183cc9de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" dzpdrsqhet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc dzpdrsqhet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" dzpdrsqhet.exe Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000_Classes\Local Settings 473c7c2b5312e33799192b66183cc9de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33472D0D9D5083206D3E77D377272CD67DF465DD" 473c7c2b5312e33799192b66183cc9de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC4B12F44E439EA52CBBAD5329DD7B9" 473c7c2b5312e33799192b66183cc9de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" dzpdrsqhet.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 473c7c2b5312e33799192b66183cc9de.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf dzpdrsqhet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" dzpdrsqhet.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs dzpdrsqhet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" dzpdrsqhet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6ACDFAB9F910F291837F3A4286ED39E2B0FD02F84367034EE2CF42E709D1" 473c7c2b5312e33799192b66183cc9de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "193DC67D14E5DBC5B9C07C97EC9434C7" 473c7c2b5312e33799192b66183cc9de.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 368 dzpdrsqhet.exe 368 dzpdrsqhet.exe 368 dzpdrsqhet.exe 368 dzpdrsqhet.exe 368 dzpdrsqhet.exe 368 dzpdrsqhet.exe 368 dzpdrsqhet.exe 368 dzpdrsqhet.exe 368 dzpdrsqhet.exe 368 dzpdrsqhet.exe 3784 cmdxosojilonqgp.exe 3784 cmdxosojilonqgp.exe 3784 cmdxosojilonqgp.exe 3784 cmdxosojilonqgp.exe 3784 cmdxosojilonqgp.exe 3784 cmdxosojilonqgp.exe 3784 cmdxosojilonqgp.exe 3784 cmdxosojilonqgp.exe 4688 oezhughf.exe 4688 oezhughf.exe 4688 oezhughf.exe 4688 oezhughf.exe 3784 cmdxosojilonqgp.exe 4688 oezhughf.exe 3784 cmdxosojilonqgp.exe 4688 oezhughf.exe 4688 oezhughf.exe 4688 oezhughf.exe 1216 ouurigmcblorc.exe 1216 ouurigmcblorc.exe 1216 ouurigmcblorc.exe 1216 ouurigmcblorc.exe 1216 ouurigmcblorc.exe 1216 ouurigmcblorc.exe 1216 ouurigmcblorc.exe 1216 ouurigmcblorc.exe 1216 ouurigmcblorc.exe 1216 ouurigmcblorc.exe 1216 ouurigmcblorc.exe 1216 ouurigmcblorc.exe 4912 oezhughf.exe 4912 oezhughf.exe 4912 oezhughf.exe 4912 oezhughf.exe 4912 oezhughf.exe 4912 oezhughf.exe 4912 oezhughf.exe 4912 oezhughf.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 368 dzpdrsqhet.exe 368 dzpdrsqhet.exe 368 dzpdrsqhet.exe 3784 cmdxosojilonqgp.exe 3784 cmdxosojilonqgp.exe 3784 cmdxosojilonqgp.exe 4688 oezhughf.exe 4688 oezhughf.exe 4688 oezhughf.exe 1216 ouurigmcblorc.exe 1216 ouurigmcblorc.exe 1216 ouurigmcblorc.exe 4912 oezhughf.exe 4912 oezhughf.exe 4912 oezhughf.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 4580 473c7c2b5312e33799192b66183cc9de.exe 368 dzpdrsqhet.exe 368 dzpdrsqhet.exe 368 dzpdrsqhet.exe 3784 cmdxosojilonqgp.exe 3784 cmdxosojilonqgp.exe 3784 cmdxosojilonqgp.exe 4688 oezhughf.exe 4688 oezhughf.exe 4688 oezhughf.exe 1216 ouurigmcblorc.exe 1216 ouurigmcblorc.exe 1216 ouurigmcblorc.exe 4912 oezhughf.exe 4912 oezhughf.exe 4912 oezhughf.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4580 wrote to memory of 368 4580 473c7c2b5312e33799192b66183cc9de.exe 56 PID 4580 wrote to memory of 368 4580 473c7c2b5312e33799192b66183cc9de.exe 56 PID 4580 wrote to memory of 368 4580 473c7c2b5312e33799192b66183cc9de.exe 56 PID 4580 wrote to memory of 3784 4580 473c7c2b5312e33799192b66183cc9de.exe 55 PID 4580 wrote to memory of 3784 4580 473c7c2b5312e33799192b66183cc9de.exe 55 PID 4580 wrote to memory of 3784 4580 473c7c2b5312e33799192b66183cc9de.exe 55 PID 4580 wrote to memory of 4688 4580 473c7c2b5312e33799192b66183cc9de.exe 50 PID 4580 wrote to memory of 4688 4580 473c7c2b5312e33799192b66183cc9de.exe 50 PID 4580 wrote to memory of 4688 4580 473c7c2b5312e33799192b66183cc9de.exe 50 PID 4580 wrote to memory of 1216 4580 473c7c2b5312e33799192b66183cc9de.exe 49 PID 4580 wrote to memory of 1216 4580 473c7c2b5312e33799192b66183cc9de.exe 49 PID 4580 wrote to memory of 1216 4580 473c7c2b5312e33799192b66183cc9de.exe 49 PID 4580 wrote to memory of 4000 4580 473c7c2b5312e33799192b66183cc9de.exe 51 PID 4580 wrote to memory of 4000 4580 473c7c2b5312e33799192b66183cc9de.exe 51 PID 368 wrote to memory of 4912 368 dzpdrsqhet.exe 52 PID 368 wrote to memory of 4912 368 dzpdrsqhet.exe 52 PID 368 wrote to memory of 4912 368 dzpdrsqhet.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\473c7c2b5312e33799192b66183cc9de.exe"C:\Users\Admin\AppData\Local\Temp\473c7c2b5312e33799192b66183cc9de.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\ouurigmcblorc.exeouurigmcblorc.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1216
-
-
C:\Windows\SysWOW64\oezhughf.exeoezhughf.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4688
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:4000
-
-
C:\Windows\SysWOW64\cmdxosojilonqgp.execmdxosojilonqgp.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3784
-
-
C:\Windows\SysWOW64\dzpdrsqhet.exedzpdrsqhet.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:368
-
-
C:\Windows\SysWOW64\oezhughf.exeC:\Windows\system32\oezhughf.exe1⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4912
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD5464202a2935b2e035114c3c435bc1ecc
SHA1a3da5b3670fe0fe39de9d0cc6a6b96dddb9eccef
SHA2561a9c269d578d7631df27b5b8daf4f0279401aecc4c27d44c94da378b81734bca
SHA512f51f35892a372983ab28eb6a00b3b93a1a068c8771e1251c372ef422fbd7af72116396a8343e9f918c087ff9e00653df94ea47f542f94e149d16d455f802310c