Analysis
-
max time kernel
63s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe
-
Size
380KB
-
MD5
08c358e0930b5d7785f00457394a94ab
-
SHA1
9506715103e4f38763958366d94f34f180463184
-
SHA256
89c3f09fa80e5aeac68bb851d108791f5cb62dfd54e0bf3140de275f6341d86d
-
SHA512
84b5b9fc377bf7cd30246c49cf277749a59dc4a98374a4f8d6ff4278de7f14242a422027b5ce08dbfb9d75e5037880d3f883cff61fbd622df5ded8b4014ee25e
-
SSDEEP
3072:mEGh0oHlPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGtl7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FD9A739E-9012-44a0-8917-58FD7BFEBBE6}\stubpath = "C:\\Windows\\{FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe" {49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{49E6D2B2-B76A-4cde-8440-1D4CB02AA77B} {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FD9A739E-9012-44a0-8917-58FD7BFEBBE6} {49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{23227D4B-02B6-46d0-A91C-E7D9C28D3E4C} {FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}\stubpath = "C:\\Windows\\{23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe" {FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}\stubpath = "C:\\Windows\\{49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe" {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{40142C1B-10CE-4d8f-B766-4384A008141B} 2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{40142C1B-10CE-4d8f-B766-4384A008141B}\stubpath = "C:\\Windows\\{40142C1B-10CE-4d8f-B766-4384A008141B}.exe" 2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9296D2CD-1AF3-47c2-8441-581809F1BB96} {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9296D2CD-1AF3-47c2-8441-581809F1BB96}\stubpath = "C:\\Windows\\{9296D2CD-1AF3-47c2-8441-581809F1BB96}.exe" {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe -
Executes dropped EXE 5 IoCs
pid Process 2680 {40142C1B-10CE-4d8f-B766-4384A008141B}.exe 1488 {9296D2CD-1AF3-47c2-8441-581809F1BB96}.exe 4756 {FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe 2680 {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe 1488 {49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\{40142C1B-10CE-4d8f-B766-4384A008141B}.exe 2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe File created C:\Windows\{9296D2CD-1AF3-47c2-8441-581809F1BB96}.exe {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe File created C:\Windows\{FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe {49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe File created C:\Windows\{23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe {FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe File created C:\Windows\{49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1936 2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe Token: SeIncBasePriorityPrivilege 2680 {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe Token: SeIncBasePriorityPrivilege 1488 {49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe Token: SeIncBasePriorityPrivilege 4756 {FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe Token: SeIncBasePriorityPrivilege 2680 {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2680 1936 2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe 99 PID 1936 wrote to memory of 2680 1936 2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe 99 PID 1936 wrote to memory of 2680 1936 2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe 99 PID 1936 wrote to memory of 1252 1936 2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe 98 PID 1936 wrote to memory of 1252 1936 2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe 98 PID 1936 wrote to memory of 1252 1936 2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe 98 PID 2680 wrote to memory of 1488 2680 {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe 103 PID 2680 wrote to memory of 1488 2680 {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe 103 PID 2680 wrote to memory of 1488 2680 {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe 103 PID 2680 wrote to memory of 3432 2680 {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe 102 PID 2680 wrote to memory of 3432 2680 {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe 102 PID 2680 wrote to memory of 3432 2680 {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe 102 PID 1488 wrote to memory of 4756 1488 {49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe 108 PID 1488 wrote to memory of 4756 1488 {49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe 108 PID 1488 wrote to memory of 4756 1488 {49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe 108 PID 1488 wrote to memory of 3416 1488 {49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe 111 PID 1488 wrote to memory of 3416 1488 {49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe 111 PID 1488 wrote to memory of 3416 1488 {49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe 111 PID 4756 wrote to memory of 2680 4756 {FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe 110 PID 4756 wrote to memory of 2680 4756 {FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe 110 PID 4756 wrote to memory of 2680 4756 {FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe 110 PID 4756 wrote to memory of 4072 4756 {FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe 109 PID 4756 wrote to memory of 4072 4756 {FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe 109 PID 4756 wrote to memory of 4072 4756 {FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe 109 PID 2680 wrote to memory of 1488 2680 {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe 112 PID 2680 wrote to memory of 1488 2680 {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe 112 PID 2680 wrote to memory of 1488 2680 {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe 112 PID 2680 wrote to memory of 3416 2680 {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe 111 PID 2680 wrote to memory of 3416 2680 {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe 111 PID 2680 wrote to memory of 3416 2680 {23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-09_08c358e0930b5d7785f00457394a94ab_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1252
-
-
C:\Windows\{40142C1B-10CE-4d8f-B766-4384A008141B}.exeC:\Windows\{40142C1B-10CE-4d8f-B766-4384A008141B}.exe2⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{40142~1.EXE > nul3⤵PID:3432
-
-
C:\Windows\{9296D2CD-1AF3-47c2-8441-581809F1BB96}.exeC:\Windows\{9296D2CD-1AF3-47c2-8441-581809F1BB96}.exe3⤵
- Executes dropped EXE
PID:1488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9296D~1.EXE > nul4⤵PID:3416
-
-
C:\Windows\{FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exeC:\Windows\{FD9A739E-9012-44a0-8917-58FD7BFEBBE6}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FD9A7~1.EXE > nul5⤵PID:4072
-
-
C:\Windows\{23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exeC:\Windows\{23227D4B-02B6-46d0-A91C-E7D9C28D3E4C}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{23227~1.EXE > nul6⤵PID:3416
-
-
C:\Windows\{49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exeC:\Windows\{49E6D2B2-B76A-4cde-8440-1D4CB02AA77B}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{49E6D~1.EXE > nul7⤵PID:2852
-
-
C:\Windows\{EC0F11A1-C5E2-4a2a-B94F-5DD39A2392A1}.exeC:\Windows\{EC0F11A1-C5E2-4a2a-B94F-5DD39A2392A1}.exe7⤵PID:3288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{EC0F1~1.EXE > nul8⤵PID:1196
-
-
C:\Windows\{9BF170BA-9B0A-453f-ACA7-1CB06CFD5A15}.exeC:\Windows\{9BF170BA-9B0A-453f-ACA7-1CB06CFD5A15}.exe8⤵PID:2444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9BF17~1.EXE > nul9⤵PID:3968
-
-
C:\Windows\{6997083B-3AB2-4609-87F4-F0CB55C77801}.exeC:\Windows\{6997083B-3AB2-4609-87F4-F0CB55C77801}.exe9⤵PID:412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{69970~1.EXE > nul10⤵PID:4516
-
-
C:\Windows\{E43E8D97-D663-4d93-848C-B39BBBF65A74}.exeC:\Windows\{E43E8D97-D663-4d93-848C-B39BBBF65A74}.exe10⤵PID:1016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E43E8~1.EXE > nul11⤵PID:1464
-
-
C:\Windows\{CB422B17-308C-4cfb-A63D-7DBFC823DA0B}.exeC:\Windows\{CB422B17-308C-4cfb-A63D-7DBFC823DA0B}.exe11⤵PID:2496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CB422~1.EXE > nul12⤵PID:3732
-
-
C:\Windows\{142D3231-D728-41e3-956B-02BA1CF3864C}.exeC:\Windows\{142D3231-D728-41e3-956B-02BA1CF3864C}.exe12⤵PID:3692
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5a9b945ac7ed94ce4296ef5f439771345
SHA1818259b56b8a6b9fbc2e23ad62e05814c5a50994
SHA256981d61b4e571ef86b6091f853477df1b30eacbc6fe3f3b4858eb3a82cc2694b4
SHA51276cf5bf7c288a92b9e633c6d6227a53b945b144b71606a42c5ef0960421ec6148b42270eb963f4159024d17240fee960c6dfc20fdff7129f4a9350ffbd6efb70
-
Filesize
12KB
MD52169b0929b9a6419f042ba1c6d385f3d
SHA1486fcb175100d94a0cb8d5cf84071216380e3782
SHA256ef1ec84705c5f578f7855bc54c4b9c308d9d62fef6cda95852071f2e8b616da2
SHA5125e83949412f2c48392dea1907ce9f40111f12b8ca017e63b432038ecad3f691c54ae41ed4b2a97afd14af4abce5406c78e6ee2116d2ef289ca2ac48b1db73eff
-
Filesize
24KB
MD533a54c83bbd43eb0f803494dbfc668ca
SHA1af3962bee72f381e55dfe44d5ac7dc194f85612b
SHA256a9e958fe0a1b33ddf448e83f9affc45f8deb1e8584ac435e1f9dec1a3b2eeaa3
SHA51280f07502263ab39b99c40680bcc569952caa7ceb096fc8a5abcec64c340eb8d9e5cf59ae67c8d1043615cdb66612751dc36c86a43b1dcd97dd0a37c4d23e9bdd
-
Filesize
203KB
MD553b89d431be25f8891dbe0f1045006fd
SHA1e5224e6b5c22ca11fe6d845190739d30df8a56a6
SHA256ae020a9f9b5284585d59086615e1506a21d7a4db939618b238e5fccfcb852fc5
SHA512af518e749c8ca727b05d554be46c772330d1050635ba830760713a1593c684f41c71f4e9eec9b729b40ca7f03740dc2314b7a8859d638171f2fe30dc389e96b8
-
Filesize
1KB
MD50469c37c06779c374b10516f746e54cd
SHA1a554cdfb5bfe2fdbef5626dff44175a0a14c9aa7
SHA25642a50b9c0cdee18b6513ca0684fe36d5108fee23b4202466ba22f5312f2c43b5
SHA5128116e597ca3fc7d7b801424a1b37533ade4fbe62b33f7045e6eaeb6b03275c7e981498b4e237230262e157aed9d257faadb6ba1586191f0ebb8d87f292cf4ce0
-
Filesize
51KB
MD51a6f04ada70f5972199794eb2d6bc45c
SHA1c45d9cd83c62a6fd40a25804a5d9815e58e73099
SHA2567c0c11b723d4a6f2a86d48162aa9257b2e0174118d2c5f3c561676a954f3af0e
SHA51220ca47105a18352e1fcf38e73b8b6ce92adaa08e304d3af847c7de4f1d180183767ac399347e853c128ae5954194c8d52484dc1ddf5624447f566de7791c3854
-
Filesize
17KB
MD58dfc2bcbac13d9f57020e8254e02a49c
SHA1c224738aa548a4efff3b0195af6a97140c69050e
SHA256945eec9896b40f314ff5c38604272d38ebe71ea4e19710632653a2901664c110
SHA5120042fcb41932e47d2429e4ded717d0a5b6d37fc7a7062adbd38d10f5a3132f76c784a4b48333f7677e258dfe15eade1fa7a47337edce4cfcdfdba3f90eb44b34
-
Filesize
29KB
MD577c79c68a3a30b26c7e7c49927d987db
SHA15f2ba9309dd059e4950cf2d53e3bf18c4de6d643
SHA25637bd188e74dcf6fe06284d1a841e83f02fdb38caf826e25147d73306c0ab71f8
SHA512891d8514eaf1c46a5b5fa18d7a52e1fd7703faa9df8eafcf9e9ebd63a2f6724efa49a60305e318c093f6d010bf0cb3a778523a41a3c497da90a44666a6c0a10a
-
Filesize
14KB
MD5bea326680e370ddb3e2c36ae16f68466
SHA143747aeb231e7bd9e97766d261da9ff212f3a24b
SHA256b8f77ffb10a237165327835705751124dba7da877bbb6ddbde54000f312bd2da
SHA512fe388da742ab768ee03745dd7bc5adda53e547889fa931c941a9f9ae3494cc8457b10738d379cc4c469b36c9fa3f65a37ee66b0d8fa701e410eda0e645c72e51
-
Filesize
25KB
MD54f1bd23f20aa146d4643c2998d839aad
SHA1c1dd7a5038958840a810ac974b40edb6ef41f266
SHA2566eb77a40a761da0bd76eef51f7d7c00b13f47b885819ba47d6e1a54eec357340
SHA512f976a4b7573c258c9bd96f45ac655cf088ae8ea8291111bb930d0df1ff493c500884333e24986317f27a61eb021118ad10751d32d84d516f6a455016c0be8ff1
-
Filesize
7KB
MD5d1ffe34d26db696869f74484c41e0259
SHA1ab90acdf04b83d685fae3b8dd95b9c7fe46643dc
SHA2562feff586facf4f048e2d1fb8356c874142046838e60be821c9d5e0c350e01030
SHA512b5b9ff3f3974f028288a412044350dde0767017140f1f9a60be7ddfb90df9e5d306dfee2cea44a8754858deaba76e82f266bc38c287835f4a0be87f48d7fc112
-
Filesize
91KB
MD507e86626752d5b0a14153a3ca91365a9
SHA1ef51013b6aa105901aba25073180d2365dbe285e
SHA2561328b1381ab9d26d9184ad01fcbeaa3870a8e3a8834fa15c74d8e66f6bf6d9e0
SHA512efab064f231a8385f4ca516d2301408d32fb60e630a53519bda7d3e1c6e58050c462138a37b6f2c32b2f248eeb9b4508eec404598b8e4ca552d10770a95216eb
-
Filesize
46KB
MD59aed754892bbec5837865626d089b10b
SHA1e8263f260381daae3eb6dd2f9e4b4ba8f9edf4e2
SHA256648bba90654d78e58b32962d70b5e3d4a2c79ce4475a70bc1d41e78e6c59eede
SHA5129b9b27d5b48984faeee80be12f942dd92ce83493dcadd70c861320049061a0ae4b0c9ddbbeb1004997eeedee954b07f18ac9299dbf5d45686ceda0e3a0c91d7b
-
Filesize
41KB
MD55bb4044df9048bf2f1a2751875d51b0c
SHA1d0360ff6b9d3e37c222216ee3637470d26b5eb42
SHA256ec5e7872babfc9d8c3ddf43c1e923d2ddbd278cabf355ed500a6a14113501b6b
SHA51261b55c360475f9bef78312556984c1680c6b584fb167d41208db1581805cd505e0395eb7fe7976a93214be68b476bfb7240397891c1452510070df1445ee5dfd
-
Filesize
61KB
MD595e5d449792593b3bb832a7fd288e6a8
SHA12e287be972f78e6cefa046a8dbafe4c8bde09cd9
SHA256a3530a9a20902af73dfb29b783f30f7ababb6079d788d76b219bd76a63b1d3b4
SHA5122c6e48aa0a25a89bbcaaaa37255134a4e765c87af9007c7f41f51cdf82db8067a5c3fff5ea3b1bfc5118991b4c62b6d23b016f0c65d4e01fe058c708b11a61df
-
Filesize
16KB
MD532eae08a4c8b118ded5dafe5a88d6a26
SHA118c7ff2d68005bb473eee7c2e5128e5720208dc0
SHA256fce1e4a29762295376b8b009153ef13b50e929eb0b0844f0d42a811e92b4de4f
SHA51290f37d4b1bfdd90540ec2178c76368e2fa9d53b8b7849783c3fb586e4f2f68ed3cfab87a7ab1f1114ead1bb3877d65bd3483d2b391fe19e5dd52dfe028d3de8f