Analysis
-
max time kernel
187s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 03:37
Static task
static1
Behavioral task
behavioral1
Sample
c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe
Resource
win10v2004-20221111-en
General
-
Target
c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe
-
Size
243KB
-
MD5
1a511c400e849f7ae09961e103039ccc
-
SHA1
80e2e994800a01b287f5d35fbef791e1e9e8cf86
-
SHA256
c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435
-
SHA512
5a383e9f2216b738a1a6e7fa5b5e64e0832649a5481d75b7259e5ed3e1088103888419c7b424f0cf220fbff6166dee434594093a05808b12dc3699c60a739b2e
-
SSDEEP
3072:PGaY46tGNttyJQ7KRjNDWI38xunbx8zPYLGT6gZfYKgZfYNpW+WROnp:u46tGdyJNDWjxQ8jYLG1ZwpZwNHWQ
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 1532 Logo1_.exe 576 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe -
Deletes itself 1 IoCs
pid Process 1324 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1324 cmd.exe 1324 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\F: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\include\win32\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe File created C:\Windows\Logo1_.exe c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe 1532 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2024 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 27 PID 1348 wrote to memory of 2024 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 27 PID 1348 wrote to memory of 2024 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 27 PID 1348 wrote to memory of 2024 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 27 PID 2024 wrote to memory of 1232 2024 net.exe 29 PID 2024 wrote to memory of 1232 2024 net.exe 29 PID 2024 wrote to memory of 1232 2024 net.exe 29 PID 2024 wrote to memory of 1232 2024 net.exe 29 PID 1348 wrote to memory of 1324 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 30 PID 1348 wrote to memory of 1324 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 30 PID 1348 wrote to memory of 1324 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 30 PID 1348 wrote to memory of 1324 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 30 PID 1348 wrote to memory of 1532 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 32 PID 1348 wrote to memory of 1532 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 32 PID 1348 wrote to memory of 1532 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 32 PID 1348 wrote to memory of 1532 1348 c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe 32 PID 1532 wrote to memory of 912 1532 Logo1_.exe 33 PID 1532 wrote to memory of 912 1532 Logo1_.exe 33 PID 1532 wrote to memory of 912 1532 Logo1_.exe 33 PID 1532 wrote to memory of 912 1532 Logo1_.exe 33 PID 912 wrote to memory of 280 912 net.exe 35 PID 912 wrote to memory of 280 912 net.exe 35 PID 912 wrote to memory of 280 912 net.exe 35 PID 912 wrote to memory of 280 912 net.exe 35 PID 1324 wrote to memory of 576 1324 cmd.exe 36 PID 1324 wrote to memory of 576 1324 cmd.exe 36 PID 1324 wrote to memory of 576 1324 cmd.exe 36 PID 1324 wrote to memory of 576 1324 cmd.exe 36 PID 1532 wrote to memory of 616 1532 Logo1_.exe 37 PID 1532 wrote to memory of 616 1532 Logo1_.exe 37 PID 1532 wrote to memory of 616 1532 Logo1_.exe 37 PID 1532 wrote to memory of 616 1532 Logo1_.exe 37 PID 616 wrote to memory of 980 616 net.exe 39 PID 616 wrote to memory of 980 616 net.exe 39 PID 616 wrote to memory of 980 616 net.exe 39 PID 616 wrote to memory of 980 616 net.exe 39 PID 1532 wrote to memory of 1268 1532 Logo1_.exe 10 PID 1532 wrote to memory of 1268 1532 Logo1_.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe"C:\Users\Admin\AppData\Local\Temp\c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1232
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aA371.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe"C:\Users\Admin\AppData\Local\Temp\c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe"4⤵
- Executes dropped EXE
PID:576
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:280
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:980
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD54837ca5d7ebe6af95d1ef267b25189aa
SHA1d233445bda2e04810f23a060a5a4fa0751480c5f
SHA256d160872af4a5661400670ed18a3f639859de2f6977d32683aa7c2a7c2370d35c
SHA5121d03cd77b32a1ea685c3274502019e75aaf96cd9a77dd419d851257507353dc999ac20fc1dbc55de387a52a83b48e54198fe1a7dce6b3e14676de00f60fc5a1d
-
C:\Users\Admin\AppData\Local\Temp\c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe
Filesize209KB
MD5eb89f4ac13f95fa31c850907d53dba87
SHA1b0a34af264273af4446867d776d9bc2717b908b0
SHA256f6415905338d2020326891f32bac7bb77553f68be40de61ba06118cad073fd89
SHA512e2c2a05d69de2859b12a3b8b9e4e98e6935a9c24a92ddae8de3a03aa586c6467a56b072885cd4afde90d2283da6aca0fb9c99654fe2fb4b9d36809f37b3d6606
-
C:\Users\Admin\AppData\Local\Temp\c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe.exe
Filesize209KB
MD5eb89f4ac13f95fa31c850907d53dba87
SHA1b0a34af264273af4446867d776d9bc2717b908b0
SHA256f6415905338d2020326891f32bac7bb77553f68be40de61ba06118cad073fd89
SHA512e2c2a05d69de2859b12a3b8b9e4e98e6935a9c24a92ddae8de3a03aa586c6467a56b072885cd4afde90d2283da6aca0fb9c99654fe2fb4b9d36809f37b3d6606
-
Filesize
33KB
MD5d20379a6043b7c9afdd5ac217cb33f43
SHA19755a607a609a5cd1ca57e3a180c5f2d04f5b6fb
SHA256423355b44e6de81ab3edad99d36a1bfb0c45888f1d2e3a970cbd4a29c5d59046
SHA51279a2c49794cd467841c1e97e4d4200f87f0fb2a202c29fa353631ec9630b0b26248c3a7737c8207c740b025a9cf6cc685e11a0c182d50c1b6d065c811580547e
-
Filesize
33KB
MD5d20379a6043b7c9afdd5ac217cb33f43
SHA19755a607a609a5cd1ca57e3a180c5f2d04f5b6fb
SHA256423355b44e6de81ab3edad99d36a1bfb0c45888f1d2e3a970cbd4a29c5d59046
SHA51279a2c49794cd467841c1e97e4d4200f87f0fb2a202c29fa353631ec9630b0b26248c3a7737c8207c740b025a9cf6cc685e11a0c182d50c1b6d065c811580547e
-
Filesize
33KB
MD5d20379a6043b7c9afdd5ac217cb33f43
SHA19755a607a609a5cd1ca57e3a180c5f2d04f5b6fb
SHA256423355b44e6de81ab3edad99d36a1bfb0c45888f1d2e3a970cbd4a29c5d59046
SHA51279a2c49794cd467841c1e97e4d4200f87f0fb2a202c29fa353631ec9630b0b26248c3a7737c8207c740b025a9cf6cc685e11a0c182d50c1b6d065c811580547e
-
\Users\Admin\AppData\Local\Temp\c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe
Filesize209KB
MD5eb89f4ac13f95fa31c850907d53dba87
SHA1b0a34af264273af4446867d776d9bc2717b908b0
SHA256f6415905338d2020326891f32bac7bb77553f68be40de61ba06118cad073fd89
SHA512e2c2a05d69de2859b12a3b8b9e4e98e6935a9c24a92ddae8de3a03aa586c6467a56b072885cd4afde90d2283da6aca0fb9c99654fe2fb4b9d36809f37b3d6606
-
\Users\Admin\AppData\Local\Temp\c50026c180ea0a370638a5b37fdab8be7413861c72bb21fe367194a550067435.exe
Filesize209KB
MD5eb89f4ac13f95fa31c850907d53dba87
SHA1b0a34af264273af4446867d776d9bc2717b908b0
SHA256f6415905338d2020326891f32bac7bb77553f68be40de61ba06118cad073fd89
SHA512e2c2a05d69de2859b12a3b8b9e4e98e6935a9c24a92ddae8de3a03aa586c6467a56b072885cd4afde90d2283da6aca0fb9c99654fe2fb4b9d36809f37b3d6606