Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe
Resource
win10v2004-20240508-en
General
-
Target
bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe
-
Size
1.5MB
-
MD5
3d0a97d15c9a9db1cbc57bc8a9a422b8
-
SHA1
08cde344efc7f8a8c614023e2d0d4c91fbc972fe
-
SHA256
bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d
-
SHA512
ae9cb0b12d1812c015446ea21ab7bcfb35729682bd9e2b16f2a6321c12a291dd40d3b4552ca2234425aae71a78bb25a3b8acd16b6d8016b83c27362141dbea17
-
SSDEEP
3072:6R4jdNqTqHLklZpb4RrRDFBI/cMrnTS4y3NkEjbvjuC8xVkxRQjZ3phRrbBgmQD:kafcEHI/prnm4y3NjTjuC8xOcxphgmQ
Malware Config
Signatures
-
Detects executables built or packed with MPress PE compressor 5 IoCs
resource yara_rule behavioral1/memory/2372-0-0x0000000000400000-0x000000000046B000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0007000000014a9a-17.dat INDICATOR_EXE_Packed_MPress behavioral1/files/0x000a000000015d6b-136.dat INDICATOR_EXE_Packed_MPress behavioral1/files/0x000b000000015d6b-152.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2372-218-0x0000000000400000-0x000000000046B000-memory.dmp INDICATOR_EXE_Packed_MPress -
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened (read-only) \??\N: bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened (read-only) \??\E: bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened (read-only) \??\G: bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened (read-only) \??\I: bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened (read-only) \??\J: bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened (read-only) \??\K: bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened (read-only) \??\L: bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened (read-only) \??\O: bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened (read-only) \??\H: bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\TranscodedWallpaper.jpg" bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\7-Zip\7zFM.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\RCX19CF.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\RCX1A6B.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\7-Zip\RCX197A.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\7-Zip\7z.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\DVD Maker\DVDMaker.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1A13.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1A36.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\RCX19CE.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1A00.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1A49.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX19F0.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1A01.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1A37.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1A59.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\7-Zip\RCX198E.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1A35.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\mip.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1A25.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\7-Zip\7z.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\7-Zip\RCX198B.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1A02.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Google\Chrome\Application\chrome.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\7-Zip\7zFM.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\RCX1A6C.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX1A5A.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\7-Zip\7z.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\RCX1A6D.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.cab bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\Program Files\DVD Maker\DVDMaker.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File opened for modification C:\Program Files\7-Zip\RCX198C.tmp bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\readme.1xt bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe File created C:\windows\WallPapers.jpg bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1924 2372 WerFault.exe 27 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Desktop\General bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Desktop\General\WallpaperSource = "C:\\windows\\WallPapers.jpg" bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1924 2372 bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe 28 PID 2372 wrote to memory of 1924 2372 bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe 28 PID 2372 wrote to memory of 1924 2372 bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe 28 PID 2372 wrote to memory of 1924 2372 bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe"C:\Users\Admin\AppData\Local\Temp\bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 9682⤵
- Program crash
PID:1924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
930KB
MD530ac0b832d75598fb3ec37b6f2a8c86a
SHA16f47dbfd6ff36df7ba581a4cef024da527dc3046
SHA2561ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74
SHA512505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057
-
Filesize
180KB
MD50fe0f69130828847307e44577a335e2c
SHA1aeb72c518fb4c9f75ff7d677323da13bc009e8d6
SHA25661913910d0b3ae16e8dc78ca07dd59fe9b15f53aec6f393de44481de806803a9
SHA51261dbe321cb265e0ba8e22acff6b09c9afea4e8d27939287fb90733a85b81576ebbe1ed7dc8feb6c29e5023244c42fd83fa088c66ac5698fdb07fceee8bf04326
-
Filesize
118KB
MD5f45a7db6aec433fd579774dfdb3eaa89
SHA12f8773cc2b720143776a0909d19b98c4954b39cc
SHA2562bc2372cfabd26933bc4012046e66a5d2efc9554c0835d1a0aa012d3bd1a6f9a
SHA51203a4b7c53373ff6308a0292bb84981dc1566923e93669bbb11cb03d9f58a8d477a1a2399aac5059f477bbf1cf14b17817d208bc7c496b8675ece83cdabec5662
-
Filesize
1.6MB
MD5527e039ba9add8a7fac3a6bc30a6d476
SHA1729a329265eda72cada039c1941e7c672addfc19
SHA2564b8a72fc81b733ed2e6e70d4c5401f954002783dbf14927849ad579860780b94
SHA5129e73e14e33a5f07a87e9c1fecfdaee09d1408471052aacfde3d1e877dad4d253b525ebefca6bddabc23cf81d8dcce0785aedcc2f135d171ecbb1feaeb922c449
-
Filesize
180KB
MD5652957b921078afbc444d5fd53dee4f7
SHA1b6fd1e252fbe5dcc964f5177f6602d29df5a0406
SHA256a57f58e07f760c121965c83a5e814e20d5b235126eab46185642542b8539188b
SHA51228097f878e7cabe934a72487c36fae8d0398b421176b81c24087a5f3dd49d2afe330d3552597620cffb0ab66851c1986cc4da3afbe623e6bcd452de34be7c412
-
Filesize
2.8MB
MD5095092f4e746810c5829038d48afd55a
SHA1246eb3d41194dddc826049bbafeb6fc522ec044a
SHA2562f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588
SHA5127f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400
-
Filesize
258KB
MD595165653731b14adb9d23dac186b4989
SHA15bfa19afff5e656a68f057832730a1949dc21249
SHA2568c13261f8775474b3a23525baeea1a0bc5986c7830c4bfcc196646cc2b00f1ba
SHA5120d1ebf7188245485d84feb87d56854b4979c3d95bafd4cecff84c015275fcfe9c516f680045c74b22936a1d24d4b1f10ced0ee775dd8092c1008605aba8824db
-
Filesize
1020KB
MD5b65d7344b0a7faa207d2e1a7adaafb60
SHA1755ad15b1745b0e730d658d4a92e2b754425b7db
SHA256f4b91fbbcba8a46eefe4965e4a24c6ede3decbd1fec96e141a1953173efd1c92
SHA512f17ac73c2df7c73a31b11ce0f533d6db91bdb0cdeea653dcd52ac72c3cf28da0c236b79586ddc7a6c825fdd171290722f888465e776f12ac2cae75be82726b22
-
Filesize
135KB
MD50d472c9720e55e9c249207de6c69722c
SHA17244426a440a268cb37b49005812b8f20f052776
SHA256bc1d3cfb69f97bc930af3af7be8601e60eb1cc78516aa844e41c65e51c316de3
SHA512f77bf33604691e0f21f1f3548187153495aad5cd5beb80b409ff50c71502e5303ddb7d64b652edc5b4177bf88e8cee0df914f91b9532b9b1116af32050291cca