Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2023, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe
Resource
win10v2004-20231020-en
General
-
Target
4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe
-
Size
86KB
-
MD5
dced222b67095f250f7dcf30f764d474
-
SHA1
35fe92130a58fa324e2aba06037686023fffe976
-
SHA256
4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1
-
SHA512
872ddbb28c7ef50730657f89750c304c326e98781766299459793a702af609f032662d94118660a75dc28958a816cc375d7d5405c9facd7c1bb2b8bd4893c5e5
-
SSDEEP
1536:cMfgLdQAQfcfymN+Rgg2VkS9fukSaErDY1TpRPj+PxI:cMftffjmN319xG/YTRPOxI
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3124 Logo1_.exe 4844 4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\en-GB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-Toolkit\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Toolkit\Images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayer.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_2019.716.2313.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\core\dev\libs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\dc-annotations\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.177.11\MicrosoftEdgeUpdateSetup.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Velocity\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ko-kr\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe File created C:\Windows\Logo1_.exe 4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe 3124 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2084 2860 4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe 85 PID 2860 wrote to memory of 2084 2860 4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe 85 PID 2860 wrote to memory of 2084 2860 4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe 85 PID 2860 wrote to memory of 3124 2860 4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe 86 PID 2860 wrote to memory of 3124 2860 4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe 86 PID 2860 wrote to memory of 3124 2860 4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe 86 PID 3124 wrote to memory of 2556 3124 Logo1_.exe 88 PID 3124 wrote to memory of 2556 3124 Logo1_.exe 88 PID 3124 wrote to memory of 2556 3124 Logo1_.exe 88 PID 2556 wrote to memory of 3104 2556 net.exe 90 PID 2556 wrote to memory of 3104 2556 net.exe 90 PID 2556 wrote to memory of 3104 2556 net.exe 90 PID 2084 wrote to memory of 4844 2084 cmd.exe 91 PID 2084 wrote to memory of 4844 2084 cmd.exe 91 PID 2084 wrote to memory of 4844 2084 cmd.exe 91 PID 3124 wrote to memory of 3360 3124 Logo1_.exe 21 PID 3124 wrote to memory of 3360 3124 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe"C:\Users\Admin\AppData\Local\Temp\4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a832A.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe"C:\Users\Admin\AppData\Local\Temp\4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe"4⤵
- Executes dropped EXE
PID:4844
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3104
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD59a77c06c3deda85017d76e0931e5df72
SHA1f71d8d065c61287fd579f3d2a0af12c0a2730a69
SHA256111400fbaa05b63d2839be7549b95b73e196af315087fc35cb5c30dc0d0ca266
SHA51277a50ad74438c5c99ff0502a0c0a709a4b85b42f30f75ec7566bcf81a7ecb7e4a620c69c651a892516c4866a19ce4b2c310addfcbba3f0f9bdec19cf828e397c
-
Filesize
373KB
MD5de185e7b66488fdaea6c05659de2e4ee
SHA16a5f2f90e7957a8e92ac27e8dc4c6ab470e26344
SHA2560165d1a64cc30935cb41f24b0d5a300929286e2bdb49e969546e2f3709f76b63
SHA5121829adeaa617d7984df83f63ac9aa3d519ddffd96624af11c2c60ce101658c2c1e5f8401bf5d89cfb8995f09d61775853f59addff183aecd52cc482f6b10d5c1
-
Filesize
722B
MD5374758ba1e2a37fda4a7204beaf744e2
SHA12700cf329d230c58c2c0942a01f1bea2333a6f59
SHA256e58f9a57c53cff28834ca3a72da0dfa83789c4f18d5a6e6363a938b462daa6af
SHA5122442acd71a4b61c844ed476f31dbf8529afb001733d7bbc3de47d8b9de1bb9628d3bb4c63519187f6892e0278b5e607845044e6385153641477bdcf8e9bba7ec
-
C:\Users\Admin\AppData\Local\Temp\4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe
Filesize60KB
MD5ccb852904a2216c1d110d475009c5182
SHA12319964fea08b7ff95e14aeb6614ebf25a18796c
SHA2566e16f4691a0c3250c8fcce465827c4996611229c2e74abc40c280afc1582831c
SHA512ab946559c55cc3f90046cc85b02635cd7c3aa9fa137d905c8c621a0697f3f37774e45ff440430107245c5e3bebe167511d9156adb6ae538f87a00d8c8631cb1f
-
C:\Users\Admin\AppData\Local\Temp\4f0fa6207ce60dc0e8492b78ed4a7d1783335a7923a277bcceb529f1e99b4eb1.exe.exe
Filesize60KB
MD5ccb852904a2216c1d110d475009c5182
SHA12319964fea08b7ff95e14aeb6614ebf25a18796c
SHA2566e16f4691a0c3250c8fcce465827c4996611229c2e74abc40c280afc1582831c
SHA512ab946559c55cc3f90046cc85b02635cd7c3aa9fa137d905c8c621a0697f3f37774e45ff440430107245c5e3bebe167511d9156adb6ae538f87a00d8c8631cb1f
-
Filesize
26KB
MD58a4489d73e1b8863df81ab298116b9e7
SHA1420e27433a94aa75f5b37f7395d3dc67adf88591
SHA25692dd20179d09a6e58d7ad5f27080e275b9fa3e9922168e9f1710e2d711eaa3cc
SHA5125ef22e387cc71bc74043e25cd61fdfc641a44053c07a9023fe4fa57b7c5a8c4cfaae418f70b7f554263e618c5b6867a9c6abc959d31a4f76091b79c5b0e56ebf
-
Filesize
26KB
MD58a4489d73e1b8863df81ab298116b9e7
SHA1420e27433a94aa75f5b37f7395d3dc67adf88591
SHA25692dd20179d09a6e58d7ad5f27080e275b9fa3e9922168e9f1710e2d711eaa3cc
SHA5125ef22e387cc71bc74043e25cd61fdfc641a44053c07a9023fe4fa57b7c5a8c4cfaae418f70b7f554263e618c5b6867a9c6abc959d31a4f76091b79c5b0e56ebf
-
Filesize
26KB
MD58a4489d73e1b8863df81ab298116b9e7
SHA1420e27433a94aa75f5b37f7395d3dc67adf88591
SHA25692dd20179d09a6e58d7ad5f27080e275b9fa3e9922168e9f1710e2d711eaa3cc
SHA5125ef22e387cc71bc74043e25cd61fdfc641a44053c07a9023fe4fa57b7c5a8c4cfaae418f70b7f554263e618c5b6867a9c6abc959d31a4f76091b79c5b0e56ebf
-
Filesize
10B
MD5f51c3552f0c301ae8d98c7fba5088597
SHA1b74920b9332b7ddc34e3d793215d6d402dfa265e
SHA256d9d5ad4ac9b545fe611f501ffb102acad318e4d1e5648061eda6ff03ffc3e3a1
SHA512281662d4c7abe512da2489431bb4ad36d979fd441654ec1212af9274dc7b0ea666111c52f1ee842adde37cbb51a8fe095091b52ad824cfdf4516f2f08232eb81