Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2023, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe
Resource
win10v2004-20230703-en
General
-
Target
8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe
-
Size
46KB
-
MD5
869ba6ac819fe933a52089277ebd09ec
-
SHA1
ea07630fa1ae65bef5d1183648f09c10721f2774
-
SHA256
8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383
-
SHA512
bf16235827c7e8a7bdc3d5bac1deec3d3040cdbf3e2fcc42a112ad19567c61495c7681156ed8bdbdb0e1a61684f0492b8eac0f725f8e9c1020f866724f7c9afa
-
SSDEEP
768:pG1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoLzXqv82FVvh:6fgLdQAQfcfymNv6v1h
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 212 Logo1_.exe 2572 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ko-KR\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\jfr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{999D2D33-1062-43FC-851C-66B4A533BE0F}\chrome_installer.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\mk-MK\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Portable Devices\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe 212 Logo1_.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2572 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe 2572 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3392 wrote to memory of 3412 3392 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe 81 PID 3392 wrote to memory of 3412 3392 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe 81 PID 3392 wrote to memory of 3412 3392 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe 81 PID 3392 wrote to memory of 212 3392 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe 82 PID 3392 wrote to memory of 212 3392 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe 82 PID 3392 wrote to memory of 212 3392 8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe 82 PID 212 wrote to memory of 3668 212 Logo1_.exe 83 PID 212 wrote to memory of 3668 212 Logo1_.exe 83 PID 212 wrote to memory of 3668 212 Logo1_.exe 83 PID 3668 wrote to memory of 3496 3668 net.exe 85 PID 3668 wrote to memory of 3496 3668 net.exe 85 PID 3668 wrote to memory of 3496 3668 net.exe 85 PID 3412 wrote to memory of 2572 3412 cmd.exe 87 PID 3412 wrote to memory of 2572 3412 cmd.exe 87 PID 3412 wrote to memory of 2572 3412 cmd.exe 87 PID 212 wrote to memory of 3256 212 Logo1_.exe 45 PID 212 wrote to memory of 3256 212 Logo1_.exe 45
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe"C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a6997.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe"C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3496
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD54f1348ee8e879b893e03458ec71e1536
SHA1c333bbc16ce1a93206ffd251465f44211cb54b13
SHA2564d4dd3e9434b8b3155e6cb43e0651f207486f0cf23753c2ef6b644fe01e27a5c
SHA512562f732f9d9bcb991ad00dea0d032a81dd54dfd93aaeff6a4493e08b064f23ea992752dde18d132421c7b36b6699dea8dabdfa454808fb393368975c0c64f078
-
Filesize
1.5MB
MD5db739fdb9daaa8c5676fdff80ba857e6
SHA13ad8346ed29b6d440bca4eeecfc7f4532583a807
SHA256dd817cd4cd133e748e5e2783416a67bd9624c447d6debdbbd23aef3c913c9221
SHA512e2362589f738809c78867d323c8f5257cae0405ac1be98551c97a7a70fd157737c98880b0b1585ce210a57e6d6eefef8ea5dabdd3ede48f9e8392729ba328f6f
-
Filesize
722B
MD5f1db3ec95094dc19e9a61834dc3f8315
SHA1d7c2106ee5d8f40af3ddc24cd8caca25a60fab62
SHA256e913294e5de71f73387af4e9476890e35f60411b56bcbbf85578f8780171d939
SHA512923f997d2af5dcb8c86f662e6cfde689951beab6bb4c0db34cd9c88c809f3fe4a1c96881a0b52425e5f18b2f6e269af461c23fa5d5db32472834ee581a956708
-
C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe
Filesize20KB
MD546eff666c94e3f7cf93ce87feb23af51
SHA1fdb4d2878166c547b4fb61996f673ae345c2415c
SHA2565115438f3279d97dfef6f319688c0b154ed0e62a55dd8e8dc6cc370a4e1aa742
SHA5126f7db660cde8a89c11f7202f720d9805d1cddeb34013bf96cc400378a31e8c0af45ed681a45ed7a1c261c9c6d93504167519f2e91cc90f6afbde636cb881486b
-
C:\Users\Admin\AppData\Local\Temp\8abbcf73ded25aeb2d26bf161304c39d112850d6a34bfc08069f5c18fdd36383.exe.exe
Filesize20KB
MD546eff666c94e3f7cf93ce87feb23af51
SHA1fdb4d2878166c547b4fb61996f673ae345c2415c
SHA2565115438f3279d97dfef6f319688c0b154ed0e62a55dd8e8dc6cc370a4e1aa742
SHA5126f7db660cde8a89c11f7202f720d9805d1cddeb34013bf96cc400378a31e8c0af45ed681a45ed7a1c261c9c6d93504167519f2e91cc90f6afbde636cb881486b
-
Filesize
26KB
MD5c8f519a43c76c60e8cbab32da4b85a13
SHA19d4378b66e2be1fad86098a540670de671229d29
SHA256480f97646d1fa17f1cb5048e297a806606ba39e27b3bd80d756ec22aa140fea1
SHA512959fefa0a643373a614802760ee4ce26f194fa6a8e7c10a6a9111116d9de0daadf76094b47168d006adc33ab8b403d36aef957c4704395761cfab6dc8c4a448a
-
Filesize
26KB
MD5c8f519a43c76c60e8cbab32da4b85a13
SHA19d4378b66e2be1fad86098a540670de671229d29
SHA256480f97646d1fa17f1cb5048e297a806606ba39e27b3bd80d756ec22aa140fea1
SHA512959fefa0a643373a614802760ee4ce26f194fa6a8e7c10a6a9111116d9de0daadf76094b47168d006adc33ab8b403d36aef957c4704395761cfab6dc8c4a448a
-
Filesize
26KB
MD5c8f519a43c76c60e8cbab32da4b85a13
SHA19d4378b66e2be1fad86098a540670de671229d29
SHA256480f97646d1fa17f1cb5048e297a806606ba39e27b3bd80d756ec22aa140fea1
SHA512959fefa0a643373a614802760ee4ce26f194fa6a8e7c10a6a9111116d9de0daadf76094b47168d006adc33ab8b403d36aef957c4704395761cfab6dc8c4a448a
-
Filesize
9B
MD5e2742b3f8546170da6c8260d83888060
SHA1ec4a745e18cde4c927f9730e3fcd45ef70af6fb9
SHA256f3d078bebcd8afbc9b72b18b103ded277477821ac1e41595bcef62e69536b50d
SHA5123dcd2e307dda0423ada567825cca9eed0d271c9f2ce4220b2009cd63a0f569f6c9761083aa631ade7fef7e7b9f22aa2c158d804275220d991a3ca11cff1dfbac