Overview
overview
10Static
static
10IQHGV07FDy...2).exe
windows7-x64
3IQHGV07FDy...vn.exe
windows7-x64
3Junk)2345.eml.ViR.eml
windows7-x64
5PC Cleaner.exe
windows7-x64
10PC_cleaner...ed.exe
windows7-x64
3PC_cleaner...ed.exe
windows7-x64
3Pizzacrypts.exe
windows7-x64
9Ponmsiyyks.exe
windows7-x64
3Rlesvxamve...on.exe
windows7-x64
SATURN_RANSOM.exe
windows7-x64
10ScreenCapt...er.exe
windows7-x64
1license key.exe
windows7-x64
malware.exe
windows7-x64
8mamba_141.exe_.exe
windows7-x64
1mamba_152.exe_.exe
windows7-x64
5microsoft-cleaned.exe
windows7-x64
3msiexec.exe
windows7-x64
10nc.exe
windows7-x64
1nd2vj1ux.exe
windows7-x64
notes.exe
windows7-x64
nzpuHohZGP...2).exe
windows7-x64
3nzpuHohZGP...sr.exe
windows7-x64
3old_14b68c...0d.exe
windows7-x64
7patched.exe
windows7-x64
9pclock.exe
windows7-x64
7pclock_unpack.exe
windows7-x64
7pitupi20.exe
windows7-x64
10pozhehgxml...co.exe
windows7-x64
7ransom_50....0b.scr
windows7-x64
9ransomware...20.exe
windows7-x64
9safeinf.exe
windows7-x64
7schet1074....16.rtf
windows7-x64
10Analysis
-
max time kernel
300s -
max time network
301s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 03:36
Behavioral task
behavioral1
Sample
IQHGV07FDyQ5u7bmNAvn (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
IQHGV07FDyQ5u7bmNAvn.exe
Resource
win7-20240729-en
Behavioral task
behavioral3
Sample
Junk)2345.eml.ViR.eml
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
PC Cleaner.exe
Resource
win7-20241010-en
Behavioral task
behavioral5
Sample
PC_cleaner-cleaned.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
PC_cleaner_database-cleaned.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
Pizzacrypts.exe
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
Ponmsiyyks.exe
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
Rlesvxamvenagx @ZL@0ECpw@ZL@ .xml.zyklon.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
SATURN_RANSOM.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
ScreenCapture_Win8.MalwareScanner.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
license key.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
malware.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
mamba_141.exe_.exe
Resource
win7-20241010-en
Behavioral task
behavioral15
Sample
mamba_152.exe_.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
microsoft-cleaned.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
msiexec.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
nc.exe
Resource
win7-20241023-en
Behavioral task
behavioral19
Sample
nd2vj1ux.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
notes.exe
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
nzpuHohZGP2RNfMTp0sr (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
nzpuHohZGP2RNfMTp0sr.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
old_14b68cb9f911ce937f52ed8282ef4395f2291c0a23f14d33f731a15572834b0d.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
patched.exe
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
pclock.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
pclock_unpack.exe
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
pitupi20.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
pozhehgxmlhobpvwlqco.exe
Resource
win7-20240708-en
Behavioral task
behavioral29
Sample
ransom_50.00_dol_df410f19157f591860e1633b85dfb50b.scr
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ransomware1061911a3e0a74827a76bbd7bfe16d20.exe
Resource
win7-20240729-en
Behavioral task
behavioral31
Sample
safeinf.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
schet1074.15.03.16.rtf
Resource
win7-20240903-en
General
-
Target
msiexec.exe
-
Size
401KB
-
MD5
8028ee3776ac68bb5789575e5a904465
-
SHA1
d142f9a30280f31b173080388bc04c71b6c45cc6
-
SHA256
f5096a51fdc054c4a217966b22f827a921d50a12436aa995d6f4180bdc4ba420
-
SHA512
33b988d5d80c072a12454a4eb49a70c93ffb3c418ae4a3ef61f1a2d8e81b0ee1e590e176ccb5391e5e7237822f022151fe4a3d7b979d301d7b1c41d5a544118a
-
SSDEEP
12288:iza760BmY7fheiaEyG5wv/kTSie0+vqGlCc:iza+afhzaEyZ4hz6C
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
Processes:
msiexec.exefc.exefc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fc.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" fc.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
msiexec.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions msiexec.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exefc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEUpdate\\fc.exe\"" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEUpdate\\fc.exe\"" fc.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
msiexec.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools msiexec.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
msiexec.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion msiexec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion msiexec.exe -
Deletes itself 1 IoCs
Processes:
tmpC774.exepid process 2944 tmpC774.exe -
Drops startup file 1 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\fc.lnk msiexec.exe -
Executes dropped EXE 4 IoCs
Processes:
fc.exetmpC774.exefc.exetmpC774.exepid process 2852 fc.exe 2840 tmpC774.exe 2612 fc.exe 2944 tmpC774.exe -
Loads dropped DLL 6 IoCs
Processes:
msiexec.execmd.exepid process 2524 msiexec.exe 2524 msiexec.exe 2524 msiexec.exe 2524 msiexec.exe 3004 cmd.exe 3004 cmd.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
fc.exemsiexec.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\fc = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEUpdate\\fc.exe\"" fc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\fc = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEUpdate\\fc.exe\"" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\fc = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEUpdate\\fc.exe\"" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\fc = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEUpdate\\fc.exe\"" fc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
msiexec.exetmpC774.exedescription pid process target process PID 2384 set thread context of 2524 2384 msiexec.exe msiexec.exe PID 2840 set thread context of 2944 2840 tmpC774.exe tmpC774.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exePING.EXEtmpC774.exemsiexec.exemsiexec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpC774.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 3004 cmd.exe 1236 PING.EXE -
Modifies Control Panel 4 IoCs
Processes:
msiexec.exefc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEUpdate\\fc.exe\"" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\Desktop fc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEUpdate\\fc.exe\"" fc.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\Desktop msiexec.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
msiexec.exemsiexec.exetmpC774.exepid process 2384 msiexec.exe 2384 msiexec.exe 2524 msiexec.exe 2524 msiexec.exe 2524 msiexec.exe 2524 msiexec.exe 2524 msiexec.exe 2524 msiexec.exe 2524 msiexec.exe 2524 msiexec.exe 2524 msiexec.exe 2524 msiexec.exe 2840 tmpC774.exe 2840 tmpC774.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
fc.exepid process 2852 fc.exe 2852 fc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
fc.exepid process 2852 fc.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
fc.exepid process 2852 fc.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
msiexec.exemsiexec.execmd.exetmpC774.exedescription pid process target process PID 2384 wrote to memory of 2524 2384 msiexec.exe msiexec.exe PID 2384 wrote to memory of 2524 2384 msiexec.exe msiexec.exe PID 2384 wrote to memory of 2524 2384 msiexec.exe msiexec.exe PID 2384 wrote to memory of 2524 2384 msiexec.exe msiexec.exe PID 2384 wrote to memory of 2524 2384 msiexec.exe msiexec.exe PID 2384 wrote to memory of 2524 2384 msiexec.exe msiexec.exe PID 2384 wrote to memory of 2524 2384 msiexec.exe msiexec.exe PID 2384 wrote to memory of 2524 2384 msiexec.exe msiexec.exe PID 2384 wrote to memory of 2524 2384 msiexec.exe msiexec.exe PID 2384 wrote to memory of 2524 2384 msiexec.exe msiexec.exe PID 2384 wrote to memory of 2524 2384 msiexec.exe msiexec.exe PID 2384 wrote to memory of 2524 2384 msiexec.exe msiexec.exe PID 2384 wrote to memory of 2524 2384 msiexec.exe msiexec.exe PID 2524 wrote to memory of 2852 2524 msiexec.exe fc.exe PID 2524 wrote to memory of 2852 2524 msiexec.exe fc.exe PID 2524 wrote to memory of 2852 2524 msiexec.exe fc.exe PID 2524 wrote to memory of 2852 2524 msiexec.exe fc.exe PID 2524 wrote to memory of 2840 2524 msiexec.exe tmpC774.exe PID 2524 wrote to memory of 2840 2524 msiexec.exe tmpC774.exe PID 2524 wrote to memory of 2840 2524 msiexec.exe tmpC774.exe PID 2524 wrote to memory of 2840 2524 msiexec.exe tmpC774.exe PID 2524 wrote to memory of 3004 2524 msiexec.exe cmd.exe PID 2524 wrote to memory of 3004 2524 msiexec.exe cmd.exe PID 2524 wrote to memory of 3004 2524 msiexec.exe cmd.exe PID 2524 wrote to memory of 3004 2524 msiexec.exe cmd.exe PID 3004 wrote to memory of 2612 3004 cmd.exe fc.exe PID 3004 wrote to memory of 2612 3004 cmd.exe fc.exe PID 3004 wrote to memory of 2612 3004 cmd.exe fc.exe PID 3004 wrote to memory of 2612 3004 cmd.exe fc.exe PID 3004 wrote to memory of 1236 3004 cmd.exe PING.EXE PID 3004 wrote to memory of 1236 3004 cmd.exe PING.EXE PID 3004 wrote to memory of 1236 3004 cmd.exe PING.EXE PID 3004 wrote to memory of 1236 3004 cmd.exe PING.EXE PID 2840 wrote to memory of 2944 2840 tmpC774.exe tmpC774.exe PID 2840 wrote to memory of 2944 2840 tmpC774.exe tmpC774.exe PID 2840 wrote to memory of 2944 2840 tmpC774.exe tmpC774.exe PID 2840 wrote to memory of 2944 2840 tmpC774.exe tmpC774.exe PID 2840 wrote to memory of 2944 2840 tmpC774.exe tmpC774.exe PID 2840 wrote to memory of 2944 2840 tmpC774.exe tmpC774.exe PID 2840 wrote to memory of 2944 2840 tmpC774.exe tmpC774.exe PID 2840 wrote to memory of 2944 2840 tmpC774.exe tmpC774.exe PID 2840 wrote to memory of 2944 2840 tmpC774.exe tmpC774.exe PID 2840 wrote to memory of 2944 2840 tmpC774.exe tmpC774.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\msiexec.exe"C:\Users\Admin\AppData\Local\Temp\msiexec.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\msiexec.exe"C:\Users\Admin\AppData\Local\Temp\msiexec.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Looks for VirtualBox Guest Additions in registry
- Adds policy Run key to start application
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\fc.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\fc.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Modifies Control Panel
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\tmpC774.exe"C:\Users\Admin\AppData\Local\Temp\tmpC774.exe" "C:\Users\Admin\AppData\Local\Temp\msiexec.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\tmpC774.exe"C:\Users\Admin\AppData\Local\Temp\tmpC774.exe" "C:\Users\Admin\AppData\Local\Temp\msiexec.exe"4⤵
- Deletes itself
- Executes dropped EXE
PID:2944
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping 127.0.0.1 >> nul3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\fc.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\fc.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
PID:2612
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1236
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.bin\S-1-5-21-3551809350-4263495960-1443967649-1000\$ast-S-1-5-21-3551809350-4263495960-1443967649-1000\3vN4X2GqtJIBGEih5.dat
Filesize21KB
MD58336733f47b9cfdd55cd8d1bdc11d8fb
SHA169f0cbcd53763d7f4871847bbeac090f57b3357c
SHA256375d96a5aad89a6b227d11e32a5e3ab5d4dc2fe074e0450e848cfade727de988
SHA5122083b1890ec97f99de8392008a7fd1324c44b8993e1fb717dca9821dfcdae2aab00dfe17a575cd73e34311d0c2d392c8269d99d77f88a20752619f3feadae8f6
-
C:\$Recycle.bin\S-1-5-21-3551809350-4263495960-1443967649-1000\$ast-S-1-5-21-3551809350-4263495960-1443967649-1000\btYKkhgqI5MszUei4DdaxW.dat
Filesize130KB
MD5961b833ceeddb6c0dffddcb767f8b92c
SHA15c3acbc9584903c8d89774bbf276aa18460eedf1
SHA25616c4f394fd81c8c0c49b4439761025789c4952258bd008edafd28d77ad509b0b
SHA5124cb068b3b8ddb3eeb7eb4eb4dc35e1215deb53f03ed6770e161f3501e7498ec34ff17ed00bfc08afeaf0f904116dce398ffb0d7684701c3b682e83aa24cf0648
-
C:\$Recycle.bin\S-1-5-21-3551809350-4263495960-1443967649-1000\$ast-S-1-5-21-3551809350-4263495960-1443967649-1000\u_3atZOzGOEeyEQ9VXPZid9oj6Str.dat
Filesize5KB
MD502ff5e4434bb3768d048b27c1c92b113
SHA1d34ea7e9177fcc1f60bc023eac1d054a699aff2a
SHA2562feadf29bbd4be9610c8f3e0aab265a8eab77f91abea523055fb8f8e1e2978ef
SHA5125af426293c08f8dd625abdc14aa67926d8a0d92b613993dfd80f628181c1be3c953f1ee16bb0ed8d6048e69ca4218cee74dd6ebd3f91802be3aa3749c75fdd90
-
Filesize
401KB
MD58028ee3776ac68bb5789575e5a904465
SHA1d142f9a30280f31b173080388bc04c71b6c45cc6
SHA256f5096a51fdc054c4a217966b22f827a921d50a12436aa995d6f4180bdc4ba420
SHA51233b988d5d80c072a12454a4eb49a70c93ffb3c418ae4a3ef61f1a2d8e81b0ee1e590e176ccb5391e5e7237822f022151fe4a3d7b979d301d7b1c41d5a544118a
-
Filesize
1KB
MD5a95283dff4027bca8d3abf3f112e3afc
SHA1e5e21a9d9e31fc5ff39d4df77e1d85a67518ca00
SHA256919c76b098ef85461544447edec75eff8e856929f03ef43f5b4c3c4fa7886562
SHA512020d9618fa0b26a763e9a8e77af6208a3793762f9824517fb0baa1603ed5c10a35657509b3c55037abf23ddc7d41965bb89996c0eb5949bf034f8ff618c4b241
-
Filesize
130KB
MD565ff24f06707a6bc04d634d81de21b62
SHA19b67ac725f4943bd5efef3a21dac34fde9dea321
SHA256c55c23f45448d73e5095f5678bd45a7993154b8818d5b29a2e02119c7612f3ba
SHA5124d84346035ff5a9e58203a4c2a9499dcb735dba29054e4cd0eb422b695621d3e7f25c45053e2ca02688cc8ba54ddcc1bc03e0c7b54e6f068895d60d1bfd52138