Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 08:04
Static task
static1
Behavioral task
behavioral1
Sample
28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe
Resource
win7-20240508-en
General
-
Target
28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe
-
Size
53KB
-
MD5
11b8817a1db9277f0052a62660ec600e
-
SHA1
b0e4bd9a440ea87618bfd0f759f17ec0c6b9701e
-
SHA256
28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3
-
SHA512
61cfe18d95dbac2eb90cf1cddb72ac504e5acb4c6a00d59450b438c1509bd31979f12b2415a919e254d7007c26fc31183bc56ab59583d5c1d3a88ee95d53a1d7
-
SSDEEP
1536:PhUaYzMXqtGNttyUn01Q78a4RgphWNFaWp:PhUaY46tGNttyJQ7KR0WDzp
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe -
Deletes itself 1 IoCs
pid Process 2580 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2672 Logo1_.exe 2728 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe -
Loads dropped DLL 1 IoCs
pid Process 2580 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\1033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SUMIPNTG\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SUMIPNTG\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PAPYRUS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUECALM\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es_MX\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe File created C:\Windows\Logo1_.exe 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe 2672 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2512 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 28 PID 2400 wrote to memory of 2512 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 28 PID 2400 wrote to memory of 2512 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 28 PID 2400 wrote to memory of 2512 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 28 PID 2512 wrote to memory of 2612 2512 net.exe 30 PID 2512 wrote to memory of 2612 2512 net.exe 30 PID 2512 wrote to memory of 2612 2512 net.exe 30 PID 2512 wrote to memory of 2612 2512 net.exe 30 PID 2400 wrote to memory of 2580 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 31 PID 2400 wrote to memory of 2580 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 31 PID 2400 wrote to memory of 2580 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 31 PID 2400 wrote to memory of 2580 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 31 PID 2400 wrote to memory of 2672 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 33 PID 2400 wrote to memory of 2672 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 33 PID 2400 wrote to memory of 2672 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 33 PID 2400 wrote to memory of 2672 2400 28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe 33 PID 2672 wrote to memory of 2556 2672 Logo1_.exe 34 PID 2672 wrote to memory of 2556 2672 Logo1_.exe 34 PID 2672 wrote to memory of 2556 2672 Logo1_.exe 34 PID 2672 wrote to memory of 2556 2672 Logo1_.exe 34 PID 2556 wrote to memory of 2960 2556 net.exe 36 PID 2556 wrote to memory of 2960 2556 net.exe 36 PID 2556 wrote to memory of 2960 2556 net.exe 36 PID 2556 wrote to memory of 2960 2556 net.exe 36 PID 2580 wrote to memory of 2728 2580 cmd.exe 37 PID 2580 wrote to memory of 2728 2580 cmd.exe 37 PID 2580 wrote to memory of 2728 2580 cmd.exe 37 PID 2580 wrote to memory of 2728 2580 cmd.exe 37 PID 2672 wrote to memory of 2604 2672 Logo1_.exe 38 PID 2672 wrote to memory of 2604 2672 Logo1_.exe 38 PID 2672 wrote to memory of 2604 2672 Logo1_.exe 38 PID 2672 wrote to memory of 2604 2672 Logo1_.exe 38 PID 2604 wrote to memory of 2428 2604 net.exe 40 PID 2604 wrote to memory of 2428 2604 net.exe 40 PID 2604 wrote to memory of 2428 2604 net.exe 40 PID 2604 wrote to memory of 2428 2604 net.exe 40 PID 2672 wrote to memory of 1132 2672 Logo1_.exe 20 PID 2672 wrote to memory of 1132 2672 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe"C:\Users\Admin\AppData\Local\Temp\28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2612
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2B06.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe"C:\Users\Admin\AppData\Local\Temp\28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe"4⤵
- Executes dropped EXE
PID:2728
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2960
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2428
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5ebb1acf3749aab2799316e438dfdbdf4
SHA1704fe023ab74891eeff0ba9779303aff0b0da5aa
SHA2562f7d16cda5245419705eeff7f92014c5d80e91d8a2d04beff74d79f832f7e77f
SHA512ff93751e380f95501d316a68f459a42e116d3ca10a1d609f4f48ca679e5b9c820021ab2c1869a8d13c5a47a291a3f81e6e22966f41ed55f0f4d64a65902bacb4
-
Filesize
478KB
MD5db30f5e16c744915af12c09f1ccf3e41
SHA1d5feb47e0ca1c47b0a4cfc90be501e97f613ce90
SHA256cfc87b2273f90e5125ca09d4fed15c56a82dabc54e418301f8ce23476201950e
SHA512ff466c60abd62f72cbe687d48fcc485855e0df65599da37112d3872324176bf68428c312d8fbfaf20deba2295b2c7fc51129436a73ba8bdc58836289f6a47f6b
-
Filesize
722B
MD5153ffbf3dbdc72f8a4fe6290db53ff44
SHA1b86ab7ea3adc9ea9e572bce154acc8e268f7a43b
SHA256a1204cec4597b38657171f548f317a4b4b60ada917cfef1efd3ab55e03f66f70
SHA5122644e61b3ae40f4ee0398e0acaad02c77bd2ce5a5403c41fec01f48db201ede5d6b8244b6d20a767fcae4ea817e6932ed198edafcb1befadc4616812ab1b5b8a
-
C:\Users\Admin\AppData\Local\Temp\28f9014ef8781f01a437a7bc88b51138a85b457285e353e09b57ee93dce8d2d3.exe.exe
Filesize19KB
MD5d7acce9a9cc1c75c377dad3c79eba7ff
SHA19c1a0eb12e8cac44ecbde6dac2d6e4852e21e0b3
SHA2560e4d0729fac0a78ae1fef66333e70fdce7c643ed84dd9033ab022111c61fd5a4
SHA51210716d1fdf3467348476130fb4a118c0cbf2064397bd53f1e0c709c0463693f06d2d1ab070eb85fb87bccb4cb06d213c3c0cd25ebd1635e61dc7a6ea043e4447
-
Filesize
33KB
MD5b889976a7791068af99766aca8f357d8
SHA1146247c065098fb7f98f6cc1094825486b77d65c
SHA2562d86f486401387ff3dcf30a8ffca900063a26c269b2e44bc1b925cbfafc30e92
SHA512bad98a62f1e63adf7fef79f14ea027179ad4255a862f30114918046d14c89256cd2f5dcc3044941ecde471d9ede8d18a4ee040ca300cd1a9b9243aabbeee9558
-
Filesize
832B
MD57e3a0edd0c6cd8316f4b6c159d5167a1
SHA1753428b4736ffb2c9e3eb50f89255b212768c55a
SHA2561965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA5129c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f
-
Filesize
9B
MD5e850d9ceb7ebcc619d731dc2f1377b2b
SHA1a45553c9057075c02e28f90d5e8ea57a0dddbacc
SHA256b682a6e85069777ca22f84b99607acd09640eaa80029d74363c0a5aabddead4c
SHA512be92bd8393d0fe69559ec55e1068fcd77ccc699361a9cb98d467bd51a029c371852b7a1196ad53fa8865e956582e6a4d35f6ac6fea3832058b7a427133b0048c