Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2023, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe
Resource
win10v2004-20230831-en
General
-
Target
2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe
-
Size
46KB
-
MD5
73398a0bf29a4720255a5beef6a13fa4
-
SHA1
51589931d17292d07ba303fb39033d0000b92109
-
SHA256
2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26
-
SHA512
8ef11a8ac847244a8a99c642d3af37a2aedd179398235f32a01882a3c89f4da2771956844f507ebfc0f12e56cdfa65881a1a1030227cae332462c3b934c31376
-
SSDEEP
768:qXi1ODKAaDMG8H92RwZNQSw+JnbmQj3FZJ9Vs9XnsDdnV9P8fGZ2Fl/flDG7OUfS:4kfgLdQAQfwt7FZJ92BsJV9q/f2OUfS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1396 Logo1_.exe 4932 2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\vi-VN\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\xaml\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\core\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\pstn\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\x86\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.UI.Xaml.2.0_2.1810.18004.0_x64__8wekyb3d8bbwe\Microsoft.UI.Xaml\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Resources\Fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files-select\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javadoc.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\he-IL\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxAccounts.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Views\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Views\Utilities\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\plugins\rhp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\SuggestionsService\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\eu-es\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe File created C:\Windows\Logo1_.exe 2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe 1396 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1056 wrote to memory of 3600 1056 2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe 82 PID 1056 wrote to memory of 3600 1056 2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe 82 PID 1056 wrote to memory of 3600 1056 2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe 82 PID 1056 wrote to memory of 1396 1056 2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe 84 PID 1056 wrote to memory of 1396 1056 2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe 84 PID 1056 wrote to memory of 1396 1056 2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe 84 PID 1396 wrote to memory of 4988 1396 Logo1_.exe 85 PID 1396 wrote to memory of 4988 1396 Logo1_.exe 85 PID 1396 wrote to memory of 4988 1396 Logo1_.exe 85 PID 4988 wrote to memory of 4424 4988 net.exe 87 PID 4988 wrote to memory of 4424 4988 net.exe 87 PID 4988 wrote to memory of 4424 4988 net.exe 87 PID 3600 wrote to memory of 4932 3600 cmd.exe 88 PID 3600 wrote to memory of 4932 3600 cmd.exe 88 PID 1396 wrote to memory of 3176 1396 Logo1_.exe 74 PID 1396 wrote to memory of 3176 1396 Logo1_.exe 74
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe"C:\Users\Admin\AppData\Local\Temp\2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBD35.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe"C:\Users\Admin\AppData\Local\Temp\2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe"4⤵
- Executes dropped EXE
PID:4932
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4424
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5e3814985e9def49c8637855d607cfb03
SHA1b2efb6f0b83e7d8f4fb9d6a5b2e78007cd1aee09
SHA256fdf1aea0605cddda4188c062841c8107cc4e2876eb5ee1c28dc2c12bb6b8402f
SHA512c07faa8b0c05ce99b58eec61794c08250b7a900d22d7e238fc848405a5bc75ac1ed23f6ff984746257dcccc8efc7d6662728edc85e5dc3a81754fda08e86a1ff
-
Filesize
484KB
MD59c5ad365b4d38b60b88ece8a43719343
SHA124ee79aebfe2a402e5c81e22433e528fbc1c4b5f
SHA256e7103884e7213f77e1574dfec609bd8a18b4a6ddeda804b90b4005751223c5a9
SHA512433cc75c4c1e2f13975fd4b7651be74f3d7a1167e3903c265945fc9dce9478e7a2caf350cb18a3890df9baf8ad6d00cd10800d7785a1e26ac1d424cd4d2a7402
-
Filesize
722B
MD51e127f8a39da535b06f0b4a284f68813
SHA1091ed7b857f8d1c2838167974b70f909676b4229
SHA2568c0b04b22e879e8f42106a72ac86dac2cc8ed80a03dde32e2548bb2885cc7582
SHA5120e68cc8e3d666137bb59ed6b7ca04fcc1c602fcb0cdb1adeba409f8a257e01bd331d93ab868f4d90f45c67d792e26bf773f0858b6952c7aeaec9d7cbe4a1c28c
-
C:\Users\Admin\AppData\Local\Temp\2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe
Filesize20KB
MD5eecbaf85768c517873d9d252a80b195f
SHA1029a51833a50acedd0cab3b4346e00c4410fe6e2
SHA256db5e89efdc811020d02ecbcd908a118baadfaf65a54b2b6d8ff413a49b750e02
SHA512fdd70770b4c42c03f85ce5c9b081df48313bc0415b1085193ea259c114befa93eff0136129b7d99f591268c546e8652512b468275b0b905497d576af9bdad4ec
-
C:\Users\Admin\AppData\Local\Temp\2aee92c0fe49edc3df621602f7b71e450a1005d4fd398c2c3e1fa18046811a26.exe.exe
Filesize20KB
MD5eecbaf85768c517873d9d252a80b195f
SHA1029a51833a50acedd0cab3b4346e00c4410fe6e2
SHA256db5e89efdc811020d02ecbcd908a118baadfaf65a54b2b6d8ff413a49b750e02
SHA512fdd70770b4c42c03f85ce5c9b081df48313bc0415b1085193ea259c114befa93eff0136129b7d99f591268c546e8652512b468275b0b905497d576af9bdad4ec
-
Filesize
26KB
MD52ed48f33e7fcab6c130f0192018f4a91
SHA131c7aa77eb1bccf88e11d92633d07cea1c53a6f0
SHA2560fbde81b9d7adffaf038060837e66644fc9a6f33ffdde8a6d710c82aa65d8cbd
SHA5123e6ef97e4bcc583c350f64f284abb8dfd387d31fb6133bf1aca1e39d6242f222991fb62d01e2ede90e378cf09e3e90074899ff8ecd7ff5959781bc08514f386e
-
Filesize
26KB
MD52ed48f33e7fcab6c130f0192018f4a91
SHA131c7aa77eb1bccf88e11d92633d07cea1c53a6f0
SHA2560fbde81b9d7adffaf038060837e66644fc9a6f33ffdde8a6d710c82aa65d8cbd
SHA5123e6ef97e4bcc583c350f64f284abb8dfd387d31fb6133bf1aca1e39d6242f222991fb62d01e2ede90e378cf09e3e90074899ff8ecd7ff5959781bc08514f386e
-
Filesize
26KB
MD52ed48f33e7fcab6c130f0192018f4a91
SHA131c7aa77eb1bccf88e11d92633d07cea1c53a6f0
SHA2560fbde81b9d7adffaf038060837e66644fc9a6f33ffdde8a6d710c82aa65d8cbd
SHA5123e6ef97e4bcc583c350f64f284abb8dfd387d31fb6133bf1aca1e39d6242f222991fb62d01e2ede90e378cf09e3e90074899ff8ecd7ff5959781bc08514f386e
-
Filesize
8B
MD595127a81ba5781b47158c7bade11f958
SHA1fa289ca07d3998db8f732dc188ff099b7dcefd86
SHA2564b413fdd0fc873cb5cf1b957078e2786827cb8d3665159e02b7bfda486133aaf
SHA512c1403a7b2e462b09a03f09ba4ecff788db0d0402c09086b65c435c606a5c898ebc9959e47f77a5985881eee0e4364b035a3fa926672e8b61e2cc9bf7c3b169a0