Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 22:13

General

  • Target

    5e3ab630d4d120f42715973f7afab30e320a9fe4da94797f74455233034da67f.exe

  • Size

    184KB

  • MD5

    b242846c329a05bb974193380f36c8e6

  • SHA1

    f3ad9500294a75f73642fe5aa09d41e298cd02f6

  • SHA256

    5e3ab630d4d120f42715973f7afab30e320a9fe4da94797f74455233034da67f

  • SHA512

    eca315b40374a2b6721f8a804c9f74b4138b49f736667d300ab0155acf88b58fa44afdd4b5a2f7ec797b0b7116c96a0ba2117d43c82b681d8ff6ab483df7662f

  • SSDEEP

    3072:m1fV6RoO+jYyZ+ftKbXE8sVzClvnq3xluB:m1qoya+fj84zClPq3xlu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 16 IoCs
  • Program crash 18 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e3ab630d4d120f42715973f7afab30e320a9fe4da94797f74455233034da67f.exe
    "C:\Users\Admin\AppData\Local\Temp\5e3ab630d4d120f42715973f7afab30e320a9fe4da94797f74455233034da67f.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-16774.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-16774.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-1589.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-1589.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1880
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-51750.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-51750.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1036
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-36566.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-36566.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4364
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-8901.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-8901.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:952
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-63338.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-63338.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2168
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-13919.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-13919.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:4128
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-37630.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-37630.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:4408
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-26338.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-26338.exe
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2840
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-29592.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-29592.exe
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:4732
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-53302.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-53302.exe
                          12⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:760
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-37926.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-37926.exe
                            13⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:2172
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53468.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-53468.exe
                              14⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:1920
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-11449.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-11449.exe
                                15⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:2996
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-14703.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-14703.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:2040
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-95.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-95.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1052
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 720
                                      18⤵
                                      • Program crash
                                      PID:812
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 752
                                      18⤵
                                      • Program crash
                                      PID:644
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 744
                                    17⤵
                                    • Program crash
                                    PID:888
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 724
                                  16⤵
                                  • Program crash
                                  PID:4508
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 724
                                15⤵
                                • Program crash
                                PID:4288
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 724
                              14⤵
                              • Program crash
                              PID:1500
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 744
                            13⤵
                            • Program crash
                            PID:4064
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 744
                          12⤵
                          • Program crash
                          PID:3060
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 724
                        11⤵
                        • Program crash
                        PID:4484
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 744
                      10⤵
                      • Program crash
                      PID:3200
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 724
                    9⤵
                    • Program crash
                    PID:1384
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 740
                  8⤵
                  • Program crash
                  PID:3308
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 744
                7⤵
                • Program crash
                PID:3568
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 724
              6⤵
              • Program crash
              PID:4072
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 724
            5⤵
            • Program crash
            PID:1388
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 724
          4⤵
          • Program crash
          PID:668
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 744
        3⤵
        • Program crash
        PID:1268
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 724
      2⤵
      • Program crash
      PID:4272
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4304 -ip 4304
    1⤵
      PID:4120
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2736 -ip 2736
      1⤵
        PID:368
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1880 -ip 1880
        1⤵
          PID:900
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1036 -ip 1036
          1⤵
            PID:2424
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4364 -ip 4364
            1⤵
              PID:1112
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 952 -ip 952
              1⤵
                PID:2328
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2168 -ip 2168
                1⤵
                  PID:4124
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4128 -ip 4128
                  1⤵
                    PID:4548
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4408 -ip 4408
                    1⤵
                      PID:3632
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2840 -ip 2840
                      1⤵
                        PID:3660
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4732 -ip 4732
                        1⤵
                          PID:1640
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 760 -ip 760
                          1⤵
                            PID:432
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2172 -ip 2172
                            1⤵
                              PID:3744
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1920 -ip 1920
                              1⤵
                                PID:4656
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2996 -ip 2996
                                1⤵
                                  PID:4856
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2040 -ip 2040
                                  1⤵
                                    PID:4364
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1052 -ip 1052
                                    1⤵
                                      PID:2088
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1052 -ip 1052
                                      1⤵
                                        PID:4256

                                      Network

                                      MITRE ATT&CK Matrix

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-11449.exe

                                        Filesize

                                        184KB

                                        MD5

                                        aecdc2b4f8fcafcea4315cc6e9ba7a36

                                        SHA1

                                        719b087a7b1bca951d7b18c87fcad78c4624d045

                                        SHA256

                                        2fb28f1f7980ab159fe434b0c5d4204b730aa843df9f47fcf36986239282949b

                                        SHA512

                                        fef01ea15ab8e993ae04eb37db59c244ebc19dedb14f0a42262472e2d74157d0a6f9db2c7aa3786b4a9790807eb7449f3d473f051f629246541dd45fd4a9ed22

                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-13919.exe

                                        Filesize

                                        184KB

                                        MD5

                                        fbe4c02b97e72041f558060d1da9fde4

                                        SHA1

                                        8d901912174fbbf791067e4a1b914444f8b86647

                                        SHA256

                                        c54cdcbf259985ea64979fdd01c93365aaccf55c698cb2b9580a2c07eb806273

                                        SHA512

                                        c795de3058772f3fdfa806b3186e7de755dd1f3d652c954a4f6bf2ede33bbb879f65fc666498f4bc0c24776769f6244457f0e1f9d2d330d71e1382982e3f4ac9

                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-14703.exe

                                        Filesize

                                        184KB

                                        MD5

                                        afc66d50b3424f372a871a33a7e7e864

                                        SHA1

                                        2a82cf248c195851362609b8ac6acfb60ef29149

                                        SHA256

                                        1c5dce9a2fe9267dc3bddc6c98cfe72795c80c23dfeaa03414522d335c1e6427

                                        SHA512

                                        7085337e30d096deecefcd0ba55cb9c45a5d2a1b11545b78f9a596efb57f9e82431390cb1c4a0bf26917928ec1598a6edc127d86091f800808fc1e488723e5f7

                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-1589.exe

                                        Filesize

                                        184KB

                                        MD5

                                        64a8552d1ab4d9cb69b0d1b3776b8c33

                                        SHA1

                                        3d8b7338dc9f7e66577e1075bd97fa5ffb914027

                                        SHA256

                                        8cff169a00aa9769d6a2f00905ab9f5309fe11f7b8e489893ef5dc25b3bf168f

                                        SHA512

                                        92bfe0f26c17d8a5ece46667d4d4cfd5847547efb7792cd0e2b0d55228b9f8eac1e035704b8faf4daf57afa7b13035368767ddc5af17d83ac4793fbef1533f37

                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-16774.exe

                                        Filesize

                                        184KB

                                        MD5

                                        d15bc1a2537bf8f5be82db8966c702f8

                                        SHA1

                                        933652b89dd252de231ae5aefd8e1981c87d45a0

                                        SHA256

                                        b5af725e94d25eeefd9b8f684cc32d8a5cf0391d1f2bd4a762cd22f5119225a0

                                        SHA512

                                        898a7bafa76a1cbb6b60565b611360bac2d5532c0975f42bc962768d6cea29120183adfa6725da8b0d2473ea96d9f2b6300f99047ba9a403740ceae55b056893

                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-26338.exe

                                        Filesize

                                        184KB

                                        MD5

                                        c497899ab3a38dd199acfe1be8e9587b

                                        SHA1

                                        3519daeffb94fb7cbd7349feb08bf5911017e702

                                        SHA256

                                        e6434236082b3b44eb97f4e98a08d6227ed68290db7656391b7416eac43ce2a7

                                        SHA512

                                        3eee24e8f7a2fa143f44148bfb530c946612bfaec063de4b4be9a492aa18f44d5cbc358bf95d8657b798afad63098608938a3a39aecdc35a4a3cda97ce8dc079

                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-29592.exe

                                        Filesize

                                        184KB

                                        MD5

                                        3b947db8344da12490352c6906ff9223

                                        SHA1

                                        f0fb0f0930ccfa29fd40831e02714a57751c2e2a

                                        SHA256

                                        b01bbb53f549a1aea1bcc0af450ab1c643a331dafb5e5e495f03bd76759da792

                                        SHA512

                                        70290996388d80ee526bb66f6151abe655bc83abf513262d1a5a090c9dcb6687137b50e629146d84f3d3496fbfef94120d073007ee939efd4709e7a379e54a59

                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-36566.exe

                                        Filesize

                                        184KB

                                        MD5

                                        1a0b2773a647cb87c6715f2ccbab0fb1

                                        SHA1

                                        0a29d1d9aecc317e332d2633bc5aacfc60a7ac44

                                        SHA256

                                        2355bdb31c9922cf849493258b153f73072864fc7259337b49f38dc2369bcf13

                                        SHA512

                                        dbd0294a10b29a5dd6179b1d9946ef443f270f2c3a027f2a07a2aa866de173448269327efaf3b46827cb089a714dbee8c27262433b103deaea10a276d30d1fd1

                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-37630.exe

                                        Filesize

                                        184KB

                                        MD5

                                        d95a939d637f0a68716f379ac1ad371d

                                        SHA1

                                        303d9307c1c589ff6ad0d0c412f3034ceacb0e4a

                                        SHA256

                                        6b176273f0d1108442ee1131c6f7f94533b45399a511b834a54b7d9c6b7fa053

                                        SHA512

                                        84a5854961f382bfaf332baf923afa1ee6dba50be9bc8fbc38fcb60f54ec141b94f1cdc93fd75a84c54b6dd5a0d52b44dd0f426ce5f2e7761e9f1f06797c292c

                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-37926.exe

                                        Filesize

                                        184KB

                                        MD5

                                        50f9ae3fbb437b34f56d32a52a72662e

                                        SHA1

                                        94a13707cfc6f38c77c128b5b355f043aca21053

                                        SHA256

                                        071efa1e7958792f2d567614df583b5b557b3a6649fcf73e2ab5bc102aef9b45

                                        SHA512

                                        8b94bca3b26045e3c6648bce3918b5e470cce0377d19615449b0589e2ec30bd230dca9d126cc4ca55475cc3f9c21703726ebe80a44f7e755f319b63946b6d683

                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-51750.exe

                                        Filesize

                                        184KB

                                        MD5

                                        fc43474f38d21205affb53f9060d3044

                                        SHA1

                                        f9602f8931f3aa9d7fa659c61ddf418f95dfcdcd

                                        SHA256

                                        3a837d15846325b212cc40077a034848bd776f83fc2e638d71007f735252a7d0

                                        SHA512

                                        2e9a9265304f432369db49b860f46d37e582d1341526d7d57eb6d7093e9098107eace56cf9d9ace2af8374f089061808e9ef727ed2bc9a25b770e25375b48dde

                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-53302.exe

                                        Filesize

                                        184KB

                                        MD5

                                        adedd08ed1e7dd972bae645cf956567e

                                        SHA1

                                        4ea116f5505563efe9a7b232e801ad8f75aca604

                                        SHA256

                                        c626135c1a34140ba051048acfce185f5cc325cca5f90a7b1178f660d27e4f04

                                        SHA512

                                        3870165df29e16620f9540c99f1a4393faafcec93cdf3badb8238240171226d8829c5c84289c0c930881082093c55dcbe170bb5733c8c890d611340d99c6a368

                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-53468.exe

                                        Filesize

                                        184KB

                                        MD5

                                        13fc1b2cd1070ef7e2fc2efbbc5d2c31

                                        SHA1

                                        420ad6277fe404fa2148d051b716c04d19b257d1

                                        SHA256

                                        e0d329ed1fa439db68c47817305b0d211e4fd7a963e14a14ac349372626ed966

                                        SHA512

                                        16d7a228ce5f601c6a222d494b3791b949d9778ad49f7145cd3418886c78e463c1232e38297bfc0e8a8a9f6768a77d6abb963fbdaa5724f66805893b8fd1a962

                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-63338.exe

                                        Filesize

                                        184KB

                                        MD5

                                        11c97ae53db8bbabb0c8f235efd8ded1

                                        SHA1

                                        061d895f2c29b335b7e573b5465a5f5fced0cfb8

                                        SHA256

                                        ff581dab2f89e736c95238fd8c2b97e2949ceae78fe810839932b94f7821db7a

                                        SHA512

                                        b2edd4fa1e00c2e0734c4f5cf5ad924be1b9fbb27fa2e780846a97b59d5de23bb3e7402ea523450dac202a92982206e48efc260000cf08eb89f64b2a658f81d4

                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-8901.exe

                                        Filesize

                                        184KB

                                        MD5

                                        eebc7c91407d147427fce6e9c232e97d

                                        SHA1

                                        d391e8f4b81dbf3583c473ea07acd01de6ff5899

                                        SHA256

                                        a6510b15f25102563eda9ba1de1a2dc607186ffe33f8fe16d447a413781a2b0f

                                        SHA512

                                        e5e55bda8e2ccae0c0b683d5af3558814c906215f839f6e88ca058d95f00558a282d37796c94da102e045c3090060b17ee11415f545f4e995fe128bef79b1d5f

                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-95.exe

                                        Filesize

                                        184KB

                                        MD5

                                        b578ddd6302236a723be17edcb79d9c5

                                        SHA1

                                        65098bb1b9f552b632c0f7d9023f62dfda7a34af

                                        SHA256

                                        0a34336298e7f4e7a04a0154b80825a9f87f3c1d3f85f0052b2321331269fc88

                                        SHA512

                                        b250bd984e0fb50ab647c7031cb37b7c9389867748852843baca9bb57f875679aa875acd9f7ea0891c5c0114760d9777b46f2d7146fb2e4b581df80d4dec1268