Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2023 10:21
Static task
static1
Behavioral task
behavioral1
Sample
b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe
Resource
win10v2004-20231020-en
General
-
Target
b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe
-
Size
53KB
-
MD5
2e34dd0ecf1ec0bdafaf10829df52683
-
SHA1
d52e9d4efdcf6928ee4cbdcb09c518fac51ce42d
-
SHA256
b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598
-
SHA512
3d58dfd45786b2ba1162aecbc1560011fceae1a2d5fe17deef2889f3fa4495517b4c933edc9c69b5106e2ae2e2ecee2d52a47012089d3de95d7f211d0b6d853a
-
SSDEEP
768:q9n1ODKAaDMG8H92RwZNQSw+JnbmQj3FZJ9Vs9XnsDs+Tw/Y112YbtVYsap3o5vo:o1fgLdQAQfwt7FZJ92BsooAYPJwPo5y7
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3776 Logo1_.exe 4024 b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ja-JP\View3d\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\management\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\eu-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\sr-cyrl-cs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\it-IT\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\WinMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxAccounts.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\TextConv\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\collect_feedback\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\cmm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\fmui.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sl-si\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe File created C:\Windows\Logo1_.exe b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe 3776 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 208 wrote to memory of 1744 208 b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe 83 PID 208 wrote to memory of 1744 208 b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe 83 PID 208 wrote to memory of 1744 208 b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe 83 PID 208 wrote to memory of 3776 208 b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe 84 PID 208 wrote to memory of 3776 208 b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe 84 PID 208 wrote to memory of 3776 208 b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe 84 PID 3776 wrote to memory of 4492 3776 Logo1_.exe 87 PID 3776 wrote to memory of 4492 3776 Logo1_.exe 87 PID 3776 wrote to memory of 4492 3776 Logo1_.exe 87 PID 4492 wrote to memory of 644 4492 net.exe 89 PID 4492 wrote to memory of 644 4492 net.exe 89 PID 4492 wrote to memory of 644 4492 net.exe 89 PID 1744 wrote to memory of 4024 1744 cmd.exe 90 PID 1744 wrote to memory of 4024 1744 cmd.exe 90 PID 1744 wrote to memory of 4024 1744 cmd.exe 90 PID 3776 wrote to memory of 3288 3776 Logo1_.exe 15 PID 3776 wrote to memory of 3288 3776 Logo1_.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe"C:\Users\Admin\AppData\Local\Temp\b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a81A3.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe"C:\Users\Admin\AppData\Local\Temp\b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe"4⤵
- Executes dropped EXE
PID:4024
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:644
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD58ce669e0c5c16e39c632994123c0b7ab
SHA15edcc020a13794046f13bfe895d38fc14851a913
SHA2564dd26f92c626b4b76622575336966f31d944aee9a848de1599072656a176a3ae
SHA512b28a4bca6c759c4fdec69753e7113781d3f025e4b1697ab6a2e1705f40921b35ffe42fd2f858f809c0159789d0884fa416732ced303e5249e617d927f8b8df0d
-
Filesize
484KB
MD5ad556822dc7cd11021557553f3765ec1
SHA1dd2bfa0b91ad1e49c090e7f37e7b8df9bdc4e114
SHA256f008df2126814eb1add60d87a480bef5b383a3b885831e7b0ee5692867d3b140
SHA512a1c0679d1b21fac0e95a6496f2e856a7c61c9750f3cd47c59887c0e78fda38c4492a78882069296c1d3d3ef9e9ca05cd9ac9c5420b6d90db29d224eadf411d22
-
Filesize
722B
MD5d2562a0a87bd575c834bd7ab8232b502
SHA102e80565b6f03f1e07d2f2173b1a070f7ad77fde
SHA256490d7e66f8f20e0ed6417003ad490283f1da769168c8a4ad34fbcc982c136927
SHA512c378ff43273c2d63bfa6e3650cccb5b8f0b9ec4d8a69b16a6704ce06683df0edf02434f252fee899a111ab067c72eb42cabeb754204fc121a86b3b7f6de9829a
-
C:\Users\Admin\AppData\Local\Temp\b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe
Filesize27KB
MD5827a092884efbae20acbaa713a5c87c5
SHA13edac2e7b2f1adc6701ccc14a99f8050e73eb7b6
SHA25677ed5d76c4185fa34b444b99859c80d4f5773c4c5a76fecca12abea40f749046
SHA51225943ce74ea644a7e8a1ceb8157008c39475eec97d5f3bb1d73538f33b1a3ca6cd7cb89f81f15a0239bea35999cb949b8854db4c80f0eb2cf3ff0c2243974731
-
C:\Users\Admin\AppData\Local\Temp\b0aed24f29b84a824b9e3bb3a84ce386b7c8a25e9a480b29f0b28de023672598.exe.exe
Filesize27KB
MD5827a092884efbae20acbaa713a5c87c5
SHA13edac2e7b2f1adc6701ccc14a99f8050e73eb7b6
SHA25677ed5d76c4185fa34b444b99859c80d4f5773c4c5a76fecca12abea40f749046
SHA51225943ce74ea644a7e8a1ceb8157008c39475eec97d5f3bb1d73538f33b1a3ca6cd7cb89f81f15a0239bea35999cb949b8854db4c80f0eb2cf3ff0c2243974731
-
Filesize
26KB
MD5fb302bb3e9a63790b545fbae9cf76e95
SHA136a3ff29e20e8c6a98e0ed0b62facf588e0de5c1
SHA256e431f29fd728f254e78f03cb50ddea4203ab6863abe479d5cd89127a2a2ef391
SHA5123c7b9db7a7030479e800f51971a223773c249758f4e38cff51214034b207cdcf427005476b3177662060e1d049d23d67627baa0548c16cc4db4236d4126d79b4
-
Filesize
26KB
MD5fb302bb3e9a63790b545fbae9cf76e95
SHA136a3ff29e20e8c6a98e0ed0b62facf588e0de5c1
SHA256e431f29fd728f254e78f03cb50ddea4203ab6863abe479d5cd89127a2a2ef391
SHA5123c7b9db7a7030479e800f51971a223773c249758f4e38cff51214034b207cdcf427005476b3177662060e1d049d23d67627baa0548c16cc4db4236d4126d79b4
-
Filesize
26KB
MD5fb302bb3e9a63790b545fbae9cf76e95
SHA136a3ff29e20e8c6a98e0ed0b62facf588e0de5c1
SHA256e431f29fd728f254e78f03cb50ddea4203ab6863abe479d5cd89127a2a2ef391
SHA5123c7b9db7a7030479e800f51971a223773c249758f4e38cff51214034b207cdcf427005476b3177662060e1d049d23d67627baa0548c16cc4db4236d4126d79b4
-
Filesize
10B
MD51ac6500de33f973231298e1a1e1e7b38
SHA1ab3a765fb39e758f638f6b49a841300ec61ff961
SHA256f1e760f9e9b5eaeaa02cb5ca5dfc3ef6a19147a66053ed02ac52b7e2ce05a050
SHA51225253907de7da7ecca0a76dfd1fb864992bc6bc092f29efb789ec2ad4d70aba377e0e28b4f64f602818ba9aefa83dc3454f07c58efdb90f38e0831354ce53f37