Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/01/2025, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe
Resource
win7-20240903-en
General
-
Target
620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe
-
Size
2.0MB
-
MD5
10ff87f8fabc6154f9a370f7fd17f928
-
SHA1
8dcfbb5f1793861d917c38d77b241f2c73f7344b
-
SHA256
620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051
-
SHA512
e7ca4a43bf8eb6fd06d180d7d4befb42887020f626c088616627f35362fb549689594a0425deb86a778067ae102219cb299677d6802ddcc8d555da9032a9bf9e
-
SSDEEP
24576:YIWvTgWtxIEUy/N3VfEj2kiGJrgnhU66dtZyXSt1Q65bNAJO4f6/NJmlEUDAS9gm:YIWTxhVG7ohU665Y0JbNm8mkjYLyu
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2952 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3000 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2720 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2612 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2684 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2360 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1480 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 776 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1380 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1444 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2820 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2916 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2348 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2668 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2788 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1728 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1584 2616 schtasks.exe 31 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1760 2616 schtasks.exe 31 -
Executes dropped EXE 1 IoCs
pid Process 1052 OSPPSVC.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\ja-JP\spoolsv.exe 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe File created C:\Program Files\Windows Sidebar\ja-JP\f3b6ecef712a24 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe File created C:\Program Files (x86)\Google\Temp\sppsvc.exe 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe File opened for modification C:\Program Files (x86)\Google\Temp\sppsvc.exe 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe File created C:\Program Files (x86)\Google\Temp\0a1fd5f707cd16 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\winsxs\amd64_microsoft-windows-x..ificateenrollmentui_31bf3856ad364e35_6.1.7600.16385_none_86663b85e279cca2\lsass.exe 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1920 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1920 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2668 schtasks.exe 1760 schtasks.exe 2684 schtasks.exe 1480 schtasks.exe 1380 schtasks.exe 2916 schtasks.exe 776 schtasks.exe 1444 schtasks.exe 2788 schtasks.exe 1584 schtasks.exe 3000 schtasks.exe 2612 schtasks.exe 2820 schtasks.exe 1728 schtasks.exe 2952 schtasks.exe 2720 schtasks.exe 2360 schtasks.exe 2348 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe Token: SeDebugPrivilege 1052 OSPPSVC.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1416 wrote to memory of 3020 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 50 PID 1416 wrote to memory of 3020 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 50 PID 1416 wrote to memory of 3020 1416 620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe 50 PID 3020 wrote to memory of 2092 3020 cmd.exe 52 PID 3020 wrote to memory of 2092 3020 cmd.exe 52 PID 3020 wrote to memory of 2092 3020 cmd.exe 52 PID 3020 wrote to memory of 1920 3020 cmd.exe 53 PID 3020 wrote to memory of 1920 3020 cmd.exe 53 PID 3020 wrote to memory of 1920 3020 cmd.exe 53 PID 3020 wrote to memory of 1052 3020 cmd.exe 54 PID 3020 wrote to memory of 1052 3020 cmd.exe 54 PID 3020 wrote to memory of 1052 3020 cmd.exe 54 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe"C:\Users\Admin\AppData\Local\Temp\620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0TmkGOr7g5.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2092
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1920
-
-
C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\OSPPSVC.exe"C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\OSPPSVC.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2952
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\MSOCache\All Users\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2720
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2360
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:776
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\Recovery\1f276ee2-69f6-11ef-8b31-62cb582c238c\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1380
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Sidebar\ja-JP\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1444
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\ja-JP\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2820
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Sidebar\ja-JP\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2916
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Google\Temp\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2348
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Temp\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2668
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Google\Temp\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d10516" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\AppData\Local\Temp\620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1584
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d10516" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\AppData\Local\Temp\620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1760
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD510ff87f8fabc6154f9a370f7fd17f928
SHA18dcfbb5f1793861d917c38d77b241f2c73f7344b
SHA256620ebdda751738d4c95cb793fbcda971e6cd1dcf082f0da63848c55ed68d1051
SHA512e7ca4a43bf8eb6fd06d180d7d4befb42887020f626c088616627f35362fb549689594a0425deb86a778067ae102219cb299677d6802ddcc8d555da9032a9bf9e
-
Filesize
188B
MD52c37421066c951752d5a7dd7b9889e0b
SHA183545a1e36236b3ba93d60618cc24d1622371ebe
SHA25654f146b7392e3d10ef0bc61c84f67325e9444aac97ae6768c4bca0201cc44a27
SHA512dc8db45a84e2342a22907423fee4d566e302516c6528f77cd483ccece82b74dab9fccabb6d480934ecc1c5c1deb564a30b320ec32097a4390fb1290fbd9298c3