Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23/09/2023, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe
Resource
win10v2004-20230915-en
General
-
Target
39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe
-
Size
129KB
-
MD5
585146f6181281f751ea01fb0e622c94
-
SHA1
192a7c15248bc93434a0df30de5dcf6d168b33d1
-
SHA256
39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6
-
SHA512
4334acdcb925e066ee19f8b32b6a6d16085eafea49c459158be1ed452dd4b6dbfb5d71225267a90fddd6106c5b1949b6aa28642b545239ab6973c043fa7e5814
-
SSDEEP
3072:eBftffhJCuUJq42/TsRMIakSt2sWllgnaavyuurPo:eJVfhguMqd/TsRMCi2sg23MQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2304 Logo1_.exe 444 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\kk-KZ\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\pt-PT\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\LiveTile\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\VideoEditor.Common\Resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files-select\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\css\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\dictation\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fi-FI\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-white\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe File created C:\Windows\Logo1_.exe 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe 2304 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4484 wrote to memory of 1244 4484 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe 86 PID 4484 wrote to memory of 1244 4484 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe 86 PID 4484 wrote to memory of 1244 4484 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe 86 PID 4484 wrote to memory of 2304 4484 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe 87 PID 4484 wrote to memory of 2304 4484 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe 87 PID 4484 wrote to memory of 2304 4484 39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe 87 PID 2304 wrote to memory of 1140 2304 Logo1_.exe 88 PID 2304 wrote to memory of 1140 2304 Logo1_.exe 88 PID 2304 wrote to memory of 1140 2304 Logo1_.exe 88 PID 1140 wrote to memory of 1032 1140 net.exe 91 PID 1140 wrote to memory of 1032 1140 net.exe 91 PID 1140 wrote to memory of 1032 1140 net.exe 91 PID 1244 wrote to memory of 444 1244 cmd.exe 92 PID 1244 wrote to memory of 444 1244 cmd.exe 92 PID 1244 wrote to memory of 444 1244 cmd.exe 92 PID 2304 wrote to memory of 3164 2304 Logo1_.exe 50 PID 2304 wrote to memory of 3164 2304 Logo1_.exe 50
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe"C:\Users\Admin\AppData\Local\Temp\39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a633E.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe"C:\Users\Admin\AppData\Local\Temp\39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe"4⤵
- Executes dropped EXE
PID:444
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1032
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5c10795b833d3a0a660032627eff4cca6
SHA113b7c0a7b3dce3ddadbb7b8e73cce3ccd133f297
SHA2569fa435904f4639c196ac7fb5a738683c3bb3ad4343a9a57eaf5a9831cae587e4
SHA512ae49e8c640a7dcfb2ae68f3d11fe630fb95df1b7e2da86e2ffa58ce7de71d4ce897da004d6c5a92f86f4c55b93ce69b8191ab3b30bed176e3bce17403b36e044
-
Filesize
484KB
MD5736b3638d4a6f79aaf6acd71628aec37
SHA1d48b040689225fa3d3f8ca09c99ae0f65f88e4a6
SHA2568c9a06f18636b4a3248995f6746d67716be7226d20618b14ef53a602fe4facf5
SHA51224480f4a841989d054e89fc072457de9634209cda5e18de08b2f8966c44e30b36f17065ab151b5f8a163d668d2634e8087e285ef35719ce25ba0b85e87b7d2b3
-
Filesize
722B
MD58f4ff657586240fde433813297271c6f
SHA1b5f2e80ea968381f98b02cad1331779d8528fe69
SHA256c48567efeb046bbc0dd23ba5df7fe912af18ce6c754cfe78534294a0e4a7267c
SHA512a285c9c4d032794e44d8abf6aef5ad66f1dffdfd88f8139b636dd083ed188c440db10cc19005a70de9a3ea7c5d8b140de33b5e389171f6647f67b23eb70107c6
-
C:\Users\Admin\AppData\Local\Temp\39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe
Filesize102KB
MD51eadbd02c1393606dc08bd49561de137
SHA1468768b6df7f729ab4cf158fe86a952ad5db90c8
SHA256cc01b15a2f8e92b7af43650e62a58b7b36213d533fe4d2add481869b35085f7f
SHA5121804a6cd1f73ca0114a81c96af32f3776060ca9dfdbd283898de4bbc64ce142c9351355c2b9aeda01ee73a6444a1b89825ecb2f319e82837012cce1b4e7771fb
-
C:\Users\Admin\AppData\Local\Temp\39bb59ad645adcf78663eec0eee8909a0144b84a9ef44e9258fcc0cb31a8afd6.exe.exe
Filesize102KB
MD51eadbd02c1393606dc08bd49561de137
SHA1468768b6df7f729ab4cf158fe86a952ad5db90c8
SHA256cc01b15a2f8e92b7af43650e62a58b7b36213d533fe4d2add481869b35085f7f
SHA5121804a6cd1f73ca0114a81c96af32f3776060ca9dfdbd283898de4bbc64ce142c9351355c2b9aeda01ee73a6444a1b89825ecb2f319e82837012cce1b4e7771fb
-
Filesize
26KB
MD57963e73ae06c842251fcf42695ae8a1d
SHA1728ba0de7098ef0894de770de3a017495bd77398
SHA256dc1a8a5e80ac711b36d5344111575bfd7b84b812e30d7eb3ab90a44aeeae9eb8
SHA512d4b098bc93ceafed1676d9760ba64e125a90eddaed4fe9bb98faa740184041c33f3598dcb7bdfcc5475786812cb8233fc742b4757fb50021861f310cc6db69b0
-
Filesize
26KB
MD57963e73ae06c842251fcf42695ae8a1d
SHA1728ba0de7098ef0894de770de3a017495bd77398
SHA256dc1a8a5e80ac711b36d5344111575bfd7b84b812e30d7eb3ab90a44aeeae9eb8
SHA512d4b098bc93ceafed1676d9760ba64e125a90eddaed4fe9bb98faa740184041c33f3598dcb7bdfcc5475786812cb8233fc742b4757fb50021861f310cc6db69b0
-
Filesize
26KB
MD57963e73ae06c842251fcf42695ae8a1d
SHA1728ba0de7098ef0894de770de3a017495bd77398
SHA256dc1a8a5e80ac711b36d5344111575bfd7b84b812e30d7eb3ab90a44aeeae9eb8
SHA512d4b098bc93ceafed1676d9760ba64e125a90eddaed4fe9bb98faa740184041c33f3598dcb7bdfcc5475786812cb8233fc742b4757fb50021861f310cc6db69b0
-
Filesize
9B
MD5872506f1dadcc0cedd1e9dee11f54da4
SHA1d1e87145ed1d918f10ae4e93ccdbb994bc906ed5
SHA256a0049e98811438481e150df54f7b555026746c943cb03106677bf75b4e412104
SHA5126cf3aeeed18e66a16ed653a5c33133ec8d5fb58cf42aab9e712cf473233e506d4f14692dff04b7c20847718e5c344ec2651e57d2ae7a034610b07679b786344c