Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2023 02:26
Static task
static1
Behavioral task
behavioral1
Sample
fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe
Resource
win10v2004-20231023-en
General
-
Target
fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe
-
Size
1.0MB
-
MD5
4bedd105b7b2b91cd234c412f55f8490
-
SHA1
e65a83024a86c95972be36fc2cc1f77dfcd842b1
-
SHA256
fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba
-
SHA512
4513a80611d5b7ccccdfb87ff28cf7b44990fbd6730d09268a64466aa0bd351f329a9209443d5f0118daa671c361f17eca08eacc473f45167d4fe2633da7d5d2
-
SSDEEP
12288:k7+ftHgiN8ZVaModCtN95MArOsAgCRm1LNoeQ1kbWccMEzoi6bkE8a8SK:k74VVNUVaMfJAgAeZYkbWNtkF8SK
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4304 Logo1_.exe 560 fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\Comprehensive\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\Simple\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\bin\dtplugin\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\MEIPreload\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedgewebview2.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\lib\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\Me\MeControl\offline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Config\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\fr-fr\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe File created C:\Windows\Logo1_.exe fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe 4304 Logo1_.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 560 fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4700 wrote to memory of 3920 4700 fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe 83 PID 4700 wrote to memory of 3920 4700 fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe 83 PID 4700 wrote to memory of 3920 4700 fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe 83 PID 4700 wrote to memory of 4304 4700 fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe 84 PID 4700 wrote to memory of 4304 4700 fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe 84 PID 4700 wrote to memory of 4304 4700 fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe 84 PID 4304 wrote to memory of 1292 4304 Logo1_.exe 85 PID 4304 wrote to memory of 1292 4304 Logo1_.exe 85 PID 4304 wrote to memory of 1292 4304 Logo1_.exe 85 PID 1292 wrote to memory of 2104 1292 net.exe 88 PID 1292 wrote to memory of 2104 1292 net.exe 88 PID 1292 wrote to memory of 2104 1292 net.exe 88 PID 3920 wrote to memory of 560 3920 cmd.exe 89 PID 3920 wrote to memory of 560 3920 cmd.exe 89 PID 4304 wrote to memory of 3316 4304 Logo1_.exe 36 PID 4304 wrote to memory of 3316 4304 Logo1_.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe"C:\Users\Admin\AppData\Local\Temp\fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aE30D.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe"C:\Users\Admin\AppData\Local\Temp\fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:560
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2104
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD510e927db6aae50e89fcb4d441d9e27e1
SHA16a2250c03aba8fe7a9c388742db5ac4e473fa178
SHA256a68e60f5bc35fdb50525110f44ad636498278629d38a3854369e9a93ed70ee19
SHA5121d6c8b2d48403d037fc31ffeee690ca956ed8595671e1400c8dad69347ac0749d94498b00feec325575d98d300c0694d0083ca7e2e72a124ff45e9f74dd09227
-
Filesize
409KB
MD59782bb09db44802e056cba6815492ad2
SHA19c6521c90d706c4d96b183bb48586e9afa68cacc
SHA25618c3bdac4adbd0d4772a46a8856c23ccf43d627262b4974a8495afaa0106a834
SHA5124694df7478d325abe43adc7e74b090bc46e254af1e0e83bd4bb48787a467a03868a1653eebf45145ae8aa114e6ea9ceb2de735308efc5c348a8f3799b9fc71f0
-
Filesize
722B
MD570a397d581edf9d69d7631cba5df4a8b
SHA1a03d80a75297c563859d1c5ba6916fb250698aca
SHA25607ab799aa42406b19b7d90bd2cbf013f7262c0ba95b65cda9ba3bef94f0e5fad
SHA512c959ae5b501f7c5b231da4f2038eb5037a5b1f28e57f765ee7579322b768a8bddc4a32badd8d9bdbb34d443f8c0046ceec3e37dcd7a84d0427dbceb7538a1857
-
C:\Users\Admin\AppData\Local\Temp\fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe
Filesize1.0MB
MD5a1152007a0ba63384cc9d39fdeb892f8
SHA1e7eab1a2763334e359f7d496a3e6bc1001daec9b
SHA2563ff29a3a41b1a314c4a244ae5d6deb1373254632240a1a674be1e39097d3f29c
SHA512053c139d661bc3eae7dc8b6d476fea6c5cc5d7533d73a7dbc2b6091c177d51dea5735c9693ef749559d0db8fc96101c6b9471e383e7178cfe42afee2a6a28f31
-
C:\Users\Admin\AppData\Local\Temp\fb87f754b30212cff0ce7871bf165f4000ae18fbd059ab509a001f2987e6b4ba.exe.exe
Filesize1.0MB
MD5a1152007a0ba63384cc9d39fdeb892f8
SHA1e7eab1a2763334e359f7d496a3e6bc1001daec9b
SHA2563ff29a3a41b1a314c4a244ae5d6deb1373254632240a1a674be1e39097d3f29c
SHA512053c139d661bc3eae7dc8b6d476fea6c5cc5d7533d73a7dbc2b6091c177d51dea5735c9693ef749559d0db8fc96101c6b9471e383e7178cfe42afee2a6a28f31
-
Filesize
26KB
MD5e7093a12cfd837f03fc2aa86eaa886ba
SHA1bfeb2bd83d5d07adb9e0df6d23177660982f884d
SHA2569ce4f790a3ad9cb93ba0b875d0888db7e560fbbbceb022a1624252a26dde4db2
SHA5128ff9f31ff0e19431aec46a5ba04387ea145f42d4480911f5ea07deb9e8e48b6ce631d919746fa7446568a3a5e56c23a92f1e632379580cd286e7bdcc04350f55
-
Filesize
26KB
MD5e7093a12cfd837f03fc2aa86eaa886ba
SHA1bfeb2bd83d5d07adb9e0df6d23177660982f884d
SHA2569ce4f790a3ad9cb93ba0b875d0888db7e560fbbbceb022a1624252a26dde4db2
SHA5128ff9f31ff0e19431aec46a5ba04387ea145f42d4480911f5ea07deb9e8e48b6ce631d919746fa7446568a3a5e56c23a92f1e632379580cd286e7bdcc04350f55
-
Filesize
26KB
MD5e7093a12cfd837f03fc2aa86eaa886ba
SHA1bfeb2bd83d5d07adb9e0df6d23177660982f884d
SHA2569ce4f790a3ad9cb93ba0b875d0888db7e560fbbbceb022a1624252a26dde4db2
SHA5128ff9f31ff0e19431aec46a5ba04387ea145f42d4480911f5ea07deb9e8e48b6ce631d919746fa7446568a3a5e56c23a92f1e632379580cd286e7bdcc04350f55
-
Filesize
10B
MD517de2acd7b02442c9cb0e8c0fccf8e96
SHA1e062bd3af8ffe48988392987af8cbbddddffb804
SHA256af7f402fe1458d28f48714376dd0e26175e667690e61b41c8bd0e61d818822d3
SHA512e04d6d828edc3ef3443dfd40f72f76351bf981a16566cf0f31e60015f588440764461b52be088f549e8a2a6fa41370129e60d36b63b66f9a63c6df89f44fdbd8