Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:23
Static task
static1
Behavioral task
behavioral1
Sample
9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe
Resource
win7-20240419-en
General
-
Target
9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe
-
Size
491KB
-
MD5
b0a6bf8d8898dddb25f6b0da52379a4a
-
SHA1
5b76b473f09844579216683c6129fcdef25bac3b
-
SHA256
9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272
-
SHA512
99469eb52f054e05bb22556d926ecafc34efd90ff63d13be11b6c78fd3279b5881c8c1092fb0855ad72d518b3b11e5325740c109e6fbaebcadd14310ca6f2eb7
-
SSDEEP
12288:73WFjV1gL5pRTcAkS/3hzN8qE43fm78V:73MI5jcAkSYqyE
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
Processes:
9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exeLogo1_.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2356 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
Logo1_.exe9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exepid process 2668 Logo1_.exe 2824 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 2356 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Logo1_.exedescription ioc process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Logo1_.exedescription ioc process File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Updater6\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ie\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zG.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1049\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ie\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
Processes:
Logo1_.exe9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exedescription ioc process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe File created C:\Windows\Logo1_.exe 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
Processes:
9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exeLogo1_.exepid process 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exenet.exeLogo1_.exenet.execmd.exenet.exedescription pid process target process PID 2180 wrote to memory of 2372 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe net.exe PID 2180 wrote to memory of 2372 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe net.exe PID 2180 wrote to memory of 2372 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe net.exe PID 2180 wrote to memory of 2372 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe net.exe PID 2372 wrote to memory of 1248 2372 net.exe net1.exe PID 2372 wrote to memory of 1248 2372 net.exe net1.exe PID 2372 wrote to memory of 1248 2372 net.exe net1.exe PID 2372 wrote to memory of 1248 2372 net.exe net1.exe PID 2180 wrote to memory of 2356 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe cmd.exe PID 2180 wrote to memory of 2356 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe cmd.exe PID 2180 wrote to memory of 2356 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe cmd.exe PID 2180 wrote to memory of 2356 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe cmd.exe PID 2180 wrote to memory of 2668 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe Logo1_.exe PID 2180 wrote to memory of 2668 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe Logo1_.exe PID 2180 wrote to memory of 2668 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe Logo1_.exe PID 2180 wrote to memory of 2668 2180 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe Logo1_.exe PID 2668 wrote to memory of 2692 2668 Logo1_.exe net.exe PID 2668 wrote to memory of 2692 2668 Logo1_.exe net.exe PID 2668 wrote to memory of 2692 2668 Logo1_.exe net.exe PID 2668 wrote to memory of 2692 2668 Logo1_.exe net.exe PID 2692 wrote to memory of 2100 2692 net.exe net1.exe PID 2692 wrote to memory of 2100 2692 net.exe net1.exe PID 2692 wrote to memory of 2100 2692 net.exe net1.exe PID 2692 wrote to memory of 2100 2692 net.exe net1.exe PID 2356 wrote to memory of 2824 2356 cmd.exe 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe PID 2356 wrote to memory of 2824 2356 cmd.exe 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe PID 2356 wrote to memory of 2824 2356 cmd.exe 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe PID 2356 wrote to memory of 2824 2356 cmd.exe 9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe PID 2668 wrote to memory of 2300 2668 Logo1_.exe net.exe PID 2668 wrote to memory of 2300 2668 Logo1_.exe net.exe PID 2668 wrote to memory of 2300 2668 Logo1_.exe net.exe PID 2668 wrote to memory of 2300 2668 Logo1_.exe net.exe PID 2300 wrote to memory of 2584 2300 net.exe net1.exe PID 2300 wrote to memory of 2584 2300 net.exe net1.exe PID 2300 wrote to memory of 2584 2300 net.exe net1.exe PID 2300 wrote to memory of 2584 2300 net.exe net1.exe PID 2668 wrote to memory of 1188 2668 Logo1_.exe Explorer.EXE PID 2668 wrote to memory of 1188 2668 Logo1_.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe"C:\Users\Admin\AppData\Local\Temp\9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1248
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a226F.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe"C:\Users\Admin\AppData\Local\Temp\9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe"4⤵
- Executes dropped EXE
PID:2824
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2100
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2584
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD5e3ed025983edd3f0811b528d691f5aad
SHA1d4dba9af05f4499e9b7b9152b4b79fdc392fea0e
SHA256baabdc56c507e1820de6caf9cfd27eb3298c955fe5725460cfb9b2e833546005
SHA512f0c40858619b35c307a55ecb3647645717a05fc229dcf3af6562720305a38b4ed2e7f4000a50ba44d2644173a1c99c8781859236f497c4d79437d19043914567
-
Filesize
722B
MD55eed529bf4e477953f9f9f67a8a1764a
SHA188a364e4839cd49536e6b67637b481d3faec9223
SHA256e8b0a9477bb2b8b32ca71f31efe9fffcba9065d3be4c2c4f8e70880cb647d3cf
SHA5123888a4b8f16483031773f039fc32cababd9204288d0a76d75c6b47899a684bb2ef28dcd6369f6c81d4e567ad236b7fc3c1dd28ac5a605eef5e0163e13a87f28c
-
C:\Users\Admin\AppData\Local\Temp\9c87bee394fa62153c5105168222818705f704dd1d9dfdb91907382183ad6272.exe.exe
Filesize458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
33KB
MD572524cf9b862c04eda809519e1ff803e
SHA131cb19b48f493554e3e8a6d8b8a41854698711e0
SHA256f602e3036944a0423d2c1fd94dea02cbd48e5f64bb346deddb8d8585c0cd2f94
SHA51266e3525b995b673f1b82d88679045379f18e16b10a53a00f4bef9175cb6980c4fce1eba62b92a9b6bb91752142572ee0f8ff3a1a317ddd7b7f7247e5d1059abb
-
Filesize
832B
MD57e3a0edd0c6cd8316f4b6c159d5167a1
SHA1753428b4736ffb2c9e3eb50f89255b212768c55a
SHA2561965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA5129c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f
-
Filesize
9B
MD5ef2876ec14bdb3dc085fc3af9311b015
SHA168b64b46b1ff0fdc9f009d8fffb8ee87c597fa56
SHA256ac2a34b4f2d44d19ca4269caf9f4e71cdb0b95ba8eb89ed52c5bc56eeeb1971c
SHA512c9998caa062ad5b1da853fabb80e88e41d9f96109af89df0309be20469ca8f5be9dd1c08f3c97030e3a487732e82304f60ee2627462e017579da4204bc163c8f