Resubmissions
22-09-2021 14:13
210922-rjttqachf8 10Analysis
-
max time kernel
600s -
max time network
601s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2024 13:48
Static task
static1
Behavioral task
behavioral1
Sample
6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe
Resource
win10v2004-20240412-en
General
-
Target
6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe
-
Size
434KB
-
MD5
556c756b428b0a6f1516de031c3bfdb3
-
SHA1
d4a8195611ac93a268b0ebdc14319a75de856725
-
SHA256
6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239
-
SHA512
0e6ffc8dd5dda62a3936a5ea311a9e7007f27ead2f86f9f3f17510a78d2181b16473c69b3b5aa465f68042adef0d95fa8403f9d5bb106dbb4896750caef60a26
-
SSDEEP
12288:rXPcLcbGfVylwG/ZDCK/ScBXo8TsyMkKMY8m7WOK9SATTsx/SA/WegYfdNbrqnuh:rXh6XcBXo8TsL8Y8m/ATTySA/DrfdNb7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1236 GetX64BTIT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 api.ipify.org 38 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3168 wrote to memory of 1236 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 96 PID 3168 wrote to memory of 1236 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 96 PID 3168 wrote to memory of 3052 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 75 PID 3168 wrote to memory of 4888 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 76 PID 3168 wrote to memory of 1872 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 77 PID 3168 wrote to memory of 452 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 78 PID 3168 wrote to memory of 4416 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 79 PID 3168 wrote to memory of 2756 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 80 PID 3168 wrote to memory of 4104 3168 6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe 81 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99 PID 3052 wrote to memory of 3724 3052 msedge.exe 99
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=123.0.6312.106 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=123.0.2420.81 --initial-client-data=0x238,0x23c,0x240,0x234,0x24c,0x7ff973f54e48,0x7ff973f54e54,0x7ff973f54e602⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2292,i,11689630796550498308,215737424132741214,262144 --variations-seed-version --mojo-platform-channel-handle=2288 /prefetch:22⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2012,i,11689630796550498308,215737424132741214,262144 --variations-seed-version --mojo-platform-channel-handle=3284 /prefetch:32⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2312,i,11689630796550498308,215737424132741214,262144 --variations-seed-version --mojo-platform-channel-handle=3568 /prefetch:82⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=5580,i,11689630796550498308,215737424132741214,262144 --variations-seed-version --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=5224,i,11689630796550498308,215737424132741214,262144 --variations-seed-version --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4388,i,11689630796550498308,215737424132741214,262144 --variations-seed-version --mojo-platform-channel-handle=4092 /prefetch:82⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3552,i,11689630796550498308,215737424132741214,262144 --variations-seed-version --mojo-platform-channel-handle=3284 /prefetch:32⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3556,i,11689630796550498308,215737424132741214,262144 --variations-seed-version --mojo-platform-channel-handle=3564 /prefetch:32⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=2148,i,11689630796550498308,215737424132741214,262144 --variations-seed-version --mojo-platform-channel-handle=4188 /prefetch:82⤵PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe"C:\Users\Admin\AppData\Local\Temp\6b64ec1c1ec9e8eb486f721c283d377a2e52f177e9f947d0d217ce84685ed239.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"2⤵
- Executes dropped EXE
PID:1236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
25KB
MD56d58db5559c3ca324568fdbaa19ab0a4
SHA13e93e129039e82007bacba81526c745e3e168d1c
SHA256d68687bd2c6817be353ba1856bd2c241b235e3d1e4eecd051865cefacc59d8ec
SHA512586d9d63dc5e4c5699805543a46f888d01a3de051764a9e777b667b3dc20ec4595277f4e5c589b0e303b6e0e6258e0e3ddf6d3691b074240e19b4cc71395e4d3
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD5fb95bad11087655e48d0a509b81d6b05
SHA137dda7af7f3d6084529e240d08a5f8093fde200d
SHA2567f8dfb789f0c3e9a599ce68292abf83d5389da4f47239fd8cf5a14921bd17057
SHA51212fbbe00b3123aa6d88362024b20824361acd1a15b4f05946c5bf23108cd364391307e347ae33e3ae9896bb807e94ac0066173d46f6bd307f703304517b47470