Overview
overview
7Static
static
3Nitrox_1.7.1.0.zip
windows11-21h2-x64
7lib/Newton...on.dll
windows11-21h2-x64
1lib/NitroxClient.dll
windows11-21h2-x64
1lib/NitroxClient.pdb
windows11-21h2-x64
3lib/Nitrox...ca.dll
windows11-21h2-x64
1lib/Nitrox...ca.pdb
windows11-21h2-x64
3lib/NitroxModel.dll
windows11-21h2-x64
1lib/NitroxModel.pdb
windows11-21h2-x64
3lib/NitroxPatcher.dll
windows11-21h2-x64
1lib/Nitrox...ll.xml
windows11-21h2-x64
1lib/NitroxPatcher.pdb
windows11-21h2-x64
3lib/NitroxServer.dll
windows11-21h2-x64
1lib/Nitrox...ll.xml
windows11-21h2-x64
1lib/NitroxServer.pdb
windows11-21h2-x64
3lib/Serilo...nc.dll
windows11-21h2-x64
1lib/Serilo...le.dll
windows11-21h2-x64
1lib/Serilo...ap.dll
windows11-21h2-x64
1lib/Serilog.dll
windows11-21h2-x64
1lib/System...rs.dll
windows11-21h2-x64
1lib/System...on.dll
windows11-21h2-x64
1lib/System...ol.dll
windows11-21h2-x64
1lib/System.Memory.dll
windows11-21h2-x64
1lib/System...rs.dll
windows11-21h2-x64
1lib/System...fe.dll
windows11-21h2-x64
1lib/System...ol.dll
windows11-21h2-x64
1lib/System...ws.dll
windows11-21h2-x64
1lib/ToastN...es.dll
windows11-21h2-x64
1lib/ToastN...ns.dll
windows11-21h2-x64
1lib/Window...er.dll
windows11-21h2-x64
1lib/discor...dk.dll
windows11-21h2-x64
1lib/dnlib.dll
windows11-21h2-x64
1lib/protobuf-net.dll
windows11-21h2-x64
1Analysis
-
max time kernel
93s -
max time network
93s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
14-12-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
Nitrox_1.7.1.0.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
lib/Newtonsoft.Json.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
lib/NitroxClient.dll
Resource
win11-20241023-en
Behavioral task
behavioral4
Sample
lib/NitroxClient.pdb
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
lib/NitroxModel-Subnautica.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
lib/NitroxModel-Subnautica.pdb
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
lib/NitroxModel.dll
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
lib/NitroxModel.pdb
Resource
win11-20241023-en
Behavioral task
behavioral9
Sample
lib/NitroxPatcher.dll
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
lib/NitroxPatcher.dll.xml
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
lib/NitroxPatcher.pdb
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
lib/NitroxServer.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
lib/NitroxServer.dll.xml
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
lib/NitroxServer.pdb
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
lib/Serilog.Sinks.Async.dll
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
lib/Serilog.Sinks.File.dll
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
lib/Serilog.Sinks.Map.dll
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
lib/Serilog.dll
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
lib/System.Buffers.dll
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
lib/System.Drawing.Common.dll
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
lib/System.IO.FileSystem.AccessControl.dll
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
lib/System.Memory.dll
Resource
win11-20241023-en
Behavioral task
behavioral23
Sample
lib/System.Numerics.Vectors.dll
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
lib/System.Runtime.CompilerServices.Unsafe.dll
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
lib/System.Security.AccessControl.dll
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
lib/System.Security.Principal.Windows.dll
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
lib/ToastNotifications.Messages.dll
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
lib/ToastNotifications.dll
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
lib/WindowsFirewallHelper.dll
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
lib/discord_game_sdk.dll
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
lib/dnlib.dll
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
lib/protobuf-net.dll
Resource
win11-20241007-en
General
-
Target
Nitrox_1.7.1.0.zip
-
Size
7.8MB
-
MD5
f7d25be0395feec244bc865acfa07043
-
SHA1
b3c74c8b4f3a2ac065ee8953c6ead832b2868e5d
-
SHA256
92f4be23fd098350031cbe2f661f90c7377d691eec91808636d415b9741b029a
-
SHA512
8efd8d687847b760c789cbe03313257543cb6b557b800c1c5e509754ae49a9dc18b05a5d62d1338298ec6cddd8166e7428479f7047feb6b221bfa1853db72a29
-
SSDEEP
196608:Wm/qcR6luQIsgHFFz+iT9iU4l6iHWCgczkWBu+ie3JWq92INOF:d/qc0lrSFp+JmEzkWB7iewq9OF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4632 NitroxLauncher.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 424 iexplore.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\HomepagesUpgradeVersion = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "8" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "9" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\GPU\DeviceId = "140" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListDomainAttributeSet = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "13" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateHighDateTime = "31149662" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPMigrationVer = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionHigh = "268435456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateLowDateTime = "520047584" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\BrowserEmulation iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\GPU\VendorId = "4318" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "395196024" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\GPU\Revision = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "268435456" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionLow = "395196024" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\GPU\SoftwareFallback = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\GPU\SubSysId = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1748 vlc.exe 4688 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1472 7zFM.exe 1748 vlc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 1472 7zFM.exe Token: 35 1472 7zFM.exe Token: SeSecurityPrivilege 1472 7zFM.exe Token: SeSecurityPrivilege 1472 7zFM.exe Token: SeDebugPrivilege 4632 NitroxLauncher.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 1472 7zFM.exe 1472 7zFM.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 1472 7zFM.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 1748 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe 4688 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1748 vlc.exe 4688 vlc.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Nitrox_1.7.1.0.zip"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1472
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1476
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\PopPing.gif1⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies Internet Explorer settings
PID:424
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -nohome1⤵
- Modifies Internet Explorer settings
PID:4592
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\GroupBlock.mp4"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1748
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\GroupBlock.mp4"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4688
-
C:\Users\Admin\Downloads\NitroxLauncher.exe"C:\Users\Admin\Downloads\NitroxLauncher.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5c443b04d0fc26b0a5a4573a78e0082a1
SHA13c957535345645dce7190b85eb10b39da96b2518
SHA256e3566b3a06430868d71e9287dfd6c6c520a3da027aabea01951d407ee131dc2f
SHA5127bbf6dac485c9e59d02edabc91ff5b15bc1319cef6905c0077ee16e3b1f572b61bff85f2400bc0f5b4aeab0260bd5d68787d72c7a688d79192952f7957a44de3
-
Filesize
304B
MD5781602441469750c3219c8c38b515ed4
SHA1e885acd1cbd0b897ebcedbb145bef1c330f80595
SHA25681970dbe581373d14fbd451ac4b3f96e5f69b79645f1ee1ca715cff3af0bf20d
SHA5122b0a1717d96edb47bdf0ffeb250a5ec11f7d0638d3e0a62fbe48c064379b473ca88ffbececb32a72129d06c040b107834f1004ccda5f0f35b8c3588034786461
-
Filesize
526B
MD52a02483605861138a4f8524056818cc0
SHA1e2af7412aaf8ffda906b00c5b70c540901fbf786
SHA256c6531e26dbad624729688065a1e201f5b4ed7f5895a34fe4a57fcac1122be241
SHA5128facbe23b9e1172791ec0b35fd727f35fb13087142536b480b2eb00d0f1e40bf735f1d007e9a3c1cae252aeeb906270e368e8c235ec62a4d93b31cadbea9407b
-
Filesize
569B
MD56a880d04dad6c333725c127f100241db
SHA11f7de3ab203ab76befaf4bc31b1ebb543820b8e7
SHA256dba683ca1d3cb934870a1c1b2c96d0b966c24d4f37f85cdd2ef890152d195bca
SHA512fda1ee176068beab854b82a428cecb394d9f326a30f6d81d8757e67f68daaf642d338febfdd529d8981ca604c8689f7dbec722aed080b69897b6861ac1089dff
-
Filesize
94KB
MD57b37c4f352a44c8246bf685258f75045
SHA1817dacb245334f10de0297e69c98b4c9470f083e
SHA256ec45f6e952b43eddc214dba703cf7f31398f3c9f535aad37f42237c56b9b778e
SHA5121e8d675b3c6c9ba257b616da268cac7f1c7a9db12ffb831ed5f8d43c0887d711c197ebc9daf735e3da9a0355bf21c2b29a2fb38a46482a2c5c8cd5628fea4c02
-
Filesize
3.5MB
MD5e801cd1a9af46b219768d79f7d2a2b98
SHA1a2e939298aec1770b0079284b5bc275ba9cee517
SHA2569c34793ccd4cde1297ed243858b6411305201b95e86d1e99cf493a9a51b88e5c
SHA51248dee9078223881716bd1360881233b6a99df3c1f6063fe69784e77243ce55e988fea1365184de69b4f1724cd59ac02d6e8deaf7fbf00eae82301122c09e71ee
-
Filesize
2KB
MD507a0a619101800cc15c38b1494ab87ca
SHA14c1dbcc4390d83503e2642afeb81292c214642e9
SHA256749b8184de2e12e47bc7b0140840a392423a9e0b07a7f20afa54c237f61ee111
SHA512e22a0ad49e3bf7985c40d76b5b389f75eaab7165ca6811c0a173f64359f06d1276fec9e285f2aa8bfbed0f7cf9aa02ce614138689bec66c1fe09a552343e121e
-
Filesize
60KB
MD50618e6e6e60c78b3dfe4933d487102a0
SHA101fb560ceaeb1e1f63f3334eb9562140abb595d8
SHA256b13efed121cc3a76c859d3241684881a9c5a6fab12a9a91e86fc5d108c8dc40b
SHA5126796e63c0d83ff2c68ecb2a90b1ffbb1707410831353ad0c31c592cc2bdd569122e16d786e0f048e4ee3efae9a90360742fa152c754e75dd233f848491efde1d
-
Filesize
224KB
MD5a9f052f7b1f8ca4e5ed949c881b38ec8
SHA12c751c2214409fe911db9330d646b8e1965e2ff7
SHA2566bf03b400e80d210108f51884adc8bfa038cf4d2f17dee64e4746642684f771c
SHA5129e1371358ef8232441876bda815deb8c35276d92c9962308448a366dbf860576f4f6c84328007217448261c597593cc9185141a927fdad4b4f4e705207b9daa7
-
Filesize
9KB
MD544feed047bde92dbd84b3c63d8296b0a
SHA198492e2eac15898b49b37e0bc35aca6e1706298d
SHA2564b81bbdaedc06cf231f810b6eb494401c86a30eee8679db3bea2f86485b20ced
SHA512932a62c2ed84ade0de8b443f8d247d79dd2aa7c8a3652d95c680a06f789e95e019a300e5a261b143f673985c2ebed59a9815798725ff92d11107ceec0e9e426d
-
Filesize
32KB
MD5c25357a7950dcfc7f85ee9d593cb1a24
SHA16a533712852465ab3c11b5c76004312d6482f07f
SHA2565b70dc2eeceb1963f9c3690c1cc8ffa793b280e903fa9a31780e6a7bb0bdfcf9
SHA51230ca628b17b2a51bd9974fe1380caf728e7826c2bb552e4bc5ac15be8f819e908fc1744932db23734fec64e0f2c758372d8c49d019407efdfb076133c6df70c6
-
Filesize
123KB
MD50aa45a8a1cd24cd2b589e4aad925f35d
SHA10dc29954c4c2ffea4c33af0e56ce84158849b81e
SHA2567a26a473af5eb7a00196e275c86d773f36e1d4caef566f97f1df7e07e20b1670
SHA5127a865b16633c09bdecda34fdf15c62db4f04f2fb8db0abf57563aea51de67daf9eca0c08f053f551937a0c3c7987a53de2454ecb13139a193291633df7262981
-
Filesize
88KB
MD5e64aa8aa12f16c7397d95683206cb70a
SHA18172b8bc3b027f36ba1182abf26609d7e401e4f8
SHA256556dc81ceda593f828ec08ecf408b92686cf0cf14df4f04da3c9c83f80cce474
SHA5121f3bc239f9cef7ea4baf6fb6524ca6aa71a6dcc3127b7da8b2dcfa46181e2e2a9a1f58ec026b3a49fb1d50157748795ba6b8dd83f81353f481fb50bb3693f743
-
Filesize
107KB
MD5ce4c69d4ba73105bf8eff333ff8d265b
SHA128549362058bce91dcad5a13993f4f4b26f17530
SHA256ed1297117c8dba2b3880246721af5b74c6ae16d745bea176adbeefc1ee75f2fb
SHA512adc3c6f4d6a70814eb665039f2ee8387522475ed90017d72a37a0a381bdd3d5dbfd2a5cf26afa01f53d0bc312ca568ebdb7d245cdb21f0808d021a92b450b624