Overview
overview
10Static
static
10The-MALWAR...ot.exe
windows7-x64
10The-MALWAR...ll.exe
windows7-x64
10The-MALWAR...BS.exe
windows7-x64
10The-MALWAR...in.exe
windows7-x64
7The-MALWAR....A.exe
windows7-x64
7The-MALWAR....A.exe
windows7-x64
10The-MALWAR....A.dll
windows7-x64
7The-MALWAR...r.xlsm
windows7-x64
10The-MALWAR...36c859
windows7-x64
1The-MALWAR...caa742
windows7-x64
1The-MALWAR...c1a732
windows7-x64
1The-MALWAR...57c046
windows7-x64
1The-MALWAR...4cde86
windows7-x64
1The-MALWAR...460a01
windows7-x64
1The-MALWAR...ece0c5
windows7-x64
1The-MALWAR...257619
windows7-x64
1The-MALWAR...fbcc59
windows7-x64
1The-MALWAR...54f69c
windows7-x64
1The-MALWAR...d539a6
windows7-x64
1The-MALWAR...4996dd
windows7-x64
1The-MALWAR...8232d5
windows7-x64
1The-MALWAR...66b948
windows7-x64
1The-MALWAR...f9db86
windows7-x64
1The-MALWAR...ea2485
windows7-x64
1The-MALWAR...us.exe
windows7-x64
6The-MALWAR....a.exe
windows7-x64
3The-MALWAR....a.exe
windows7-x64
7The-MALWAR...ok.exe
windows7-x64
10The-MALWAR...y.html
windows7-x64
3The-MALWAR...ft.exe
windows7-x64
4The-MALWAR...en.exe
windows7-x64
6The-MALWAR...min.js
windows7-x64
3Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/02/2025, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Dridex.JhiSharp.dll.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexDroppedVBS.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexLoader.bin.exe
Resource
win7-20241023-en
Behavioral task
behavioral5
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win7-20241010-en
Behavioral task
behavioral7
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
The-MALWARE-Repo-master/Banking-Malware/Zloader.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/001eb377f0452060012124cb214f658754c7488ccb82e23ec56b2f45a636c859
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/041bc20ca8ac3161098cbc976e67e3c0f1b672ad36ecbe22fd21cbd53bcaa742
Resource
win7-20240729-en
Behavioral task
behavioral11
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/0ab8836efcaa62c7daac314e0b7ab1679319b2901578fd9e95ec3476b4c1a732
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/2378e76aba1ad6e0c937fb39989217bf0de616fdad4726c0f4233bf5414cde86
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01
Resource
win7-20241010-en
Behavioral task
behavioral15
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/3205603282a636979a55aa1e1be518cd3adcbbe491745d996ceb4b5a4dece0c5
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/453468b86856665f2cc0e0e71668c0b6aac8b14326c623995ba5963f22257619
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/5fb29fb0136978b9ccf60750af09cec74a257a0ca9c47159ca74dbba21fbcc59
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/6fe6808b9cfe654f526108ec61cb5211bb6601d28e192cadf06102073b54f69c
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7745b070943e910e8807e3521ac7b7a01401d131bf6c18a63433f8177ed539a6
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7f18e5b5b7645a80a0d44adf3fecdafcbf937bfe30a4cfb965a1421e034996dd
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/90b61cc77bb2d726219fd00ae2d0ecdf6f0fe7078529e87b7ec8e603008232d5
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948
Resource
win7-20250207-en
Behavioral task
behavioral23
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/985ffee662969825146d1b465d068ea4f5f01990d13827511415fd497cf9db86
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/d1e82d4a37959a9e6b661e31b8c8c6d2813c93ac92508a2771b2491b04ea2485
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
The-MALWARE-Repo-master/Email-Worm/Amus.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
The-MALWARE-Repo-master/Email-Worm/Anap.a.exe
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
The-MALWARE-Repo-master/Email-Worm/Axam.a.exe
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
The-MALWARE-Repo-master/Email-Worm/Brontok.exe
Resource
win7-20240729-en
Behavioral task
behavioral29
Sample
The-MALWARE-Repo-master/Email-Worm/BubbleBoy.html
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
The-MALWARE-Repo-master/Email-Worm/Bugsoft.exe
Resource
win7-20241010-en
Behavioral task
behavioral31
Sample
The-MALWARE-Repo-master/Email-Worm/Duksten.exe
Resource
win7-20250207-en
Behavioral task
behavioral32
Sample
The-MALWARE-Repo-master/Email-Worm/Emin.js
Resource
win7-20240903-en
General
-
Target
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
-
Size
628KB
-
MD5
97a26d9e3598fea2e1715c6c77b645c2
-
SHA1
c4bf3a00c9223201aa11178d0f0b53c761a551c4
-
SHA256
e5df93c0fedca105218296cbfc083bdc535ca99862f10d21a179213203d6794f
-
SHA512
acfec633714f72bd5c39f16f10e39e88b5c1cf0adab7154891a383912852f92d3415b0b2d874a8f8f3166879e63796a8ed25ee750c6e4be09a4dddd8c849920c
-
SSDEEP
12288:2oXYZawPO7urFw4HLLDOeLSwg4ULeHOuCqA8:2oXYFIuh5HjhSwiJ8
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1216 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kccgsbu = "\"C:\\Users\\Admin\\AppData\\Roaming\\NQmXr7z\\ddodiag.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\7gMH\SnippingTool.exe cmd.exe File created C:\Windows\system32\7gMH\SnippingTool.exe cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2604 SnippingTool.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\MSCFile\shell\open\command Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\MSCFile\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\fYOY.cmd" Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\MSCFile\shell\open\command Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\MSCFile\shell\open Process not Found Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\MSCFile Process not Found Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\MSCFile\shell Process not Found Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\MSCFile\shell\open Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\MSCFile\shell Process not Found Key deleted \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\MSCFile Process not Found -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1528 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2268 rundll32.exe 2268 rundll32.exe 2268 rundll32.exe 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2704 1216 Process not Found 31 PID 1216 wrote to memory of 2704 1216 Process not Found 31 PID 1216 wrote to memory of 2704 1216 Process not Found 31 PID 1216 wrote to memory of 2840 1216 Process not Found 32 PID 1216 wrote to memory of 2840 1216 Process not Found 32 PID 1216 wrote to memory of 2840 1216 Process not Found 32 PID 1216 wrote to memory of 2604 1216 Process not Found 34 PID 1216 wrote to memory of 2604 1216 Process not Found 34 PID 1216 wrote to memory of 2604 1216 Process not Found 34 PID 1216 wrote to memory of 2708 1216 Process not Found 35 PID 1216 wrote to memory of 2708 1216 Process not Found 35 PID 1216 wrote to memory of 2708 1216 Process not Found 35 PID 1216 wrote to memory of 2548 1216 Process not Found 37 PID 1216 wrote to memory of 2548 1216 Process not Found 37 PID 1216 wrote to memory of 2548 1216 Process not Found 37 PID 2548 wrote to memory of 1620 2548 eventvwr.exe 38 PID 2548 wrote to memory of 1620 2548 eventvwr.exe 38 PID 2548 wrote to memory of 1620 2548 eventvwr.exe 38 PID 1620 wrote to memory of 1528 1620 cmd.exe 40 PID 1620 wrote to memory of 1528 1620 cmd.exe 40 PID 1620 wrote to memory of 1528 1620 cmd.exe 40 PID 1216 wrote to memory of 1892 1216 Process not Found 41 PID 1216 wrote to memory of 1892 1216 Process not Found 41 PID 1216 wrote to memory of 1892 1216 Process not Found 41 PID 1892 wrote to memory of 2032 1892 cmd.exe 43 PID 1892 wrote to memory of 2032 1892 cmd.exe 43 PID 1892 wrote to memory of 2032 1892 cmd.exe 43 PID 1216 wrote to memory of 2868 1216 Process not Found 44 PID 1216 wrote to memory of 2868 1216 Process not Found 44 PID 1216 wrote to memory of 2868 1216 Process not Found 44 PID 2868 wrote to memory of 1144 2868 cmd.exe 46 PID 2868 wrote to memory of 1144 2868 cmd.exe 46 PID 2868 wrote to memory of 1144 2868 cmd.exe 46 PID 1216 wrote to memory of 2100 1216 Process not Found 47 PID 1216 wrote to memory of 2100 1216 Process not Found 47 PID 1216 wrote to memory of 2100 1216 Process not Found 47 PID 2100 wrote to memory of 2188 2100 cmd.exe 49 PID 2100 wrote to memory of 2188 2100 cmd.exe 49 PID 2100 wrote to memory of 2188 2100 cmd.exe 49 PID 1216 wrote to memory of 836 1216 Process not Found 50 PID 1216 wrote to memory of 836 1216 Process not Found 50 PID 1216 wrote to memory of 836 1216 Process not Found 50 PID 836 wrote to memory of 760 836 cmd.exe 52 PID 836 wrote to memory of 760 836 cmd.exe 52 PID 836 wrote to memory of 760 836 cmd.exe 52 PID 1216 wrote to memory of 1856 1216 Process not Found 53 PID 1216 wrote to memory of 1856 1216 Process not Found 53 PID 1216 wrote to memory of 1856 1216 Process not Found 53 PID 1856 wrote to memory of 1724 1856 cmd.exe 55 PID 1856 wrote to memory of 1724 1856 cmd.exe 55 PID 1856 wrote to memory of 1724 1856 cmd.exe 55 PID 1216 wrote to memory of 344 1216 Process not Found 56 PID 1216 wrote to memory of 344 1216 Process not Found 56 PID 1216 wrote to memory of 344 1216 Process not Found 56 PID 344 wrote to memory of 2324 344 cmd.exe 58 PID 344 wrote to memory of 2324 344 cmd.exe 58 PID 344 wrote to memory of 2324 344 cmd.exe 58 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Banking-Malware\Dridex\Trojan.Dridex.A.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
C:\Windows\system32\ddodiag.exeC:\Windows\system32\ddodiag.exe1⤵PID:2704
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\NuFWqB.cmd1⤵PID:2840
-
C:\Windows\system32\SnippingTool.exeC:\Windows\system32\SnippingTool.exe1⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2604
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\vDj.cmd1⤵
- Drops file in System32 directory
PID:2708
-
C:\Windows\System32\eventvwr.exe"C:\Windows\System32\eventvwr.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\fYOY.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Uofpoxfgtb" /TR C:\Windows\system32\7gMH\SnippingTool.exe /SC minute /MO 60 /RL highest3⤵
- Scheduled Task/Job: Scheduled Task
PID:1528
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Uofpoxfgtb"1⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Uofpoxfgtb"2⤵PID:2032
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Uofpoxfgtb"1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Uofpoxfgtb"2⤵PID:1144
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Uofpoxfgtb"1⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Uofpoxfgtb"2⤵PID:2188
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Uofpoxfgtb"1⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Uofpoxfgtb"2⤵PID:760
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Uofpoxfgtb"1⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Uofpoxfgtb"2⤵PID:1724
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Uofpoxfgtb"1⤵
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Uofpoxfgtb"2⤵PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
233B
MD5cad7747e80e0adaa152d525cd76a2f07
SHA1fd881e8e2677431789a0468d58b16a4cb7157c61
SHA256d6efcee0af7eb583c3a0a2a1b900d89bb0186047030a6d57cbb189890b4de96c
SHA512bc82b457920c2b1c32d4a8729bc29506bb6a76287a29dba2f7af6423fbcc2a86e1167229fda8088ec9d3de1aa73d5c62637fe702b2cfd07a12d3c46003b01dd4
-
Filesize
628KB
MD5ff46eb690fe76fde08ac27de82330e78
SHA10a6e01c08c676fd0c9b1eb6b058b5dacb8b1dc32
SHA256ed3ec7ce9b1fd0a54d091289dfb7c897775b1c715a924fe88442fd1e1c5d9cee
SHA51257255c988aab446b8ae138da0d5e97de3f04421ab61fc0d916b75a13ea8889e5f44b6fe449598a69c49d830f37ce6889daa24252c3055235e674de80b8f364c3
-
Filesize
131B
MD56869bb67d2e145b09575925dcc3b2ed4
SHA1d91c2d88c29dc5705863de5f45adcf5882cc8da5
SHA25693dabebfe21549320b7b9ba9d4e5cd8e0df8211487c4ac93314c165f6c83f13d
SHA5121f9f21a3511c1bec1362d7d3c7addcf9a8704de6949a5989fab32b16a00b85e32d48bce6486cf3d9258916bc152797ddc50f517fa01b3f954dd88375e24f9144
-
Filesize
628KB
MD561accd5890280f912056abceed54d446
SHA1df3df5c837adf54154ef25342fcd101916840081
SHA256669ebcc899e4f1d31d51db6d7fa6b31d746a013a75e2da9423b6a7b17e6ad982
SHA51205cf4c1d7d66c06d8b17ac51fac46e9c9bb35e5c195d55f83b93dcbf70b08e785aec9e1b3151dc8da03046d1571333dcc3b6d6fc7e82a9336a375c04d67ab137
-
Filesize
196B
MD577695ce944f76aa9e1f57454132d4012
SHA15656c392f721b31dfcdd6d9c7ccf68bf9f65eda3
SHA25667ef504a14a10ecb1896479f34c58a8ac40eebdc68dc01fde7da100a26063762
SHA5123e4e963dd1ff63ff4156a1eb427793222b78436bfedb7fe21bee70970522cd5baf71f2d4d7fcfd7be2bdc37f10f97aff3107599e876f31a8407eb6b10e2e8726
-
Filesize
884B
MD5b2a09303ff362453c2ef7e987b4aeb4d
SHA123f23299a5a2b7dba687a496cbf6b7b95c2a4f7a
SHA256a29235b80fda829a6b766963eb03bc7f19c473d1bf2e762033c894e8211f01bb
SHA512405cd3e7653a65df9af00bc9c37f73291e8ed095b2b9a3d5dc969cb7a4a920199bb89c831a9f73891e11c0536db852ddb91927758981cecb6debaab49c0c76a2
-
Filesize
42KB
MD5509f9513ca16ba2f2047f5227a05d1a8
SHA1fe8d63259cb9afa17da7b7b8ede4e75081071b1a
SHA256ddf48c333e45c56c9e3f16e492c023bf138629f4c093b8aaab8ea60310c8c96e
SHA512ad3168767e5eba575ae766e1e2923b1db4571bbeb302d7c58e8023612e33913dcd9e5f4a4c1bc7b1556442a0807117066f17c62b38fe2ae0dfaa3817b7318862