Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 14:17
Static task
static1
Behavioral task
behavioral1
Sample
998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe
Resource
win7-20240704-en
General
-
Target
998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe
-
Size
177KB
-
MD5
51628916327cfbc45fc7c15f2e4b5751
-
SHA1
b609c00c6fdfd75b78b149d5ab74d029233eb709
-
SHA256
998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927
-
SHA512
88511839d15701d7e851ace7bf7611329160fc2bbe8e34097f561d08f450cca139ff1bea25db0ed3e4c20ace8da78ef04e687d0a14dde3292bf29a499c4f7bd2
-
SSDEEP
3072:BofZ4ZHUIWDfByOpGjAvb3eLG2FmDDSrDVTFooWZet3:mMHqpyOpGcj3UFmDDSrDVTSBQ3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2840 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 2784 Logo1_.exe 2868 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe -
Loads dropped DLL 1 IoCs
pid Process 2840 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7z.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ta\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUECALM\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SUMIPNTG\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sm\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Cultures\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe File created C:\Windows\Logo1_.exe 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe 2784 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2152 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 29 PID 2472 wrote to memory of 2152 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 29 PID 2472 wrote to memory of 2152 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 29 PID 2472 wrote to memory of 2152 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 29 PID 2152 wrote to memory of 2212 2152 net.exe 31 PID 2152 wrote to memory of 2212 2152 net.exe 31 PID 2152 wrote to memory of 2212 2152 net.exe 31 PID 2152 wrote to memory of 2212 2152 net.exe 31 PID 2472 wrote to memory of 2840 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 32 PID 2472 wrote to memory of 2840 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 32 PID 2472 wrote to memory of 2840 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 32 PID 2472 wrote to memory of 2840 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 32 PID 2472 wrote to memory of 2784 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 34 PID 2472 wrote to memory of 2784 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 34 PID 2472 wrote to memory of 2784 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 34 PID 2472 wrote to memory of 2784 2472 998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe 34 PID 2784 wrote to memory of 2892 2784 Logo1_.exe 35 PID 2784 wrote to memory of 2892 2784 Logo1_.exe 35 PID 2784 wrote to memory of 2892 2784 Logo1_.exe 35 PID 2784 wrote to memory of 2892 2784 Logo1_.exe 35 PID 2892 wrote to memory of 2920 2892 net.exe 37 PID 2892 wrote to memory of 2920 2892 net.exe 37 PID 2892 wrote to memory of 2920 2892 net.exe 37 PID 2892 wrote to memory of 2920 2892 net.exe 37 PID 2840 wrote to memory of 2868 2840 cmd.exe 38 PID 2840 wrote to memory of 2868 2840 cmd.exe 38 PID 2840 wrote to memory of 2868 2840 cmd.exe 38 PID 2840 wrote to memory of 2868 2840 cmd.exe 38 PID 2784 wrote to memory of 2120 2784 Logo1_.exe 39 PID 2784 wrote to memory of 2120 2784 Logo1_.exe 39 PID 2784 wrote to memory of 2120 2784 Logo1_.exe 39 PID 2784 wrote to memory of 2120 2784 Logo1_.exe 39 PID 2120 wrote to memory of 2680 2120 net.exe 41 PID 2120 wrote to memory of 2680 2120 net.exe 41 PID 2120 wrote to memory of 2680 2120 net.exe 41 PID 2120 wrote to memory of 2680 2120 net.exe 41 PID 2784 wrote to memory of 1252 2784 Logo1_.exe 20 PID 2784 wrote to memory of 1252 2784 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe"C:\Users\Admin\AppData\Local\Temp\998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:2212
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1545.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe"C:\Users\Admin\AppData\Local\Temp\998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe"4⤵
- Executes dropped EXE
PID:2868
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD56028470621a870e37ea49499b4044df3
SHA190f86d2b21cd3b2d2940c3b0066fd46680c4ff62
SHA2568a4b651cc3b85bcec5f000ebba490795941af94b8680dd4876d35153d3242e18
SHA51221927cbfb83b5e0b90c2baadba1bf845bee1e3a733447adedd29b143e1defadc79443661f0686a5d2549310dee27c1c3e442f3e22981d0b808436380655601a2
-
Filesize
722B
MD5a2de677d23e163a79d8ddd27396f2a90
SHA196e5a98f726f38fa44621704e57c5157e9906b16
SHA2561dd9cb9d01f114aca84f8367a1e80f07812881686b7014ebfdb453a392ef0c86
SHA51206c0b6adbcc12c9675813fbeefe75c5e407ea02d01630cc1c6f01348f6958579b295dfef485690ddcb3dce41d6e83a0867593d01b4c6045164893278bab022ec
-
C:\Users\Admin\AppData\Local\Temp\998eb7f53f0193957622c1f0975337a46095af71406f4be9963bd737a69dd927.exe.exe
Filesize143KB
MD533b4c87f18b4c49114d7a8980241657a
SHA1254c67b915e45ad8584434a4af5e06ca730baa3b
SHA256587296f3ff624295079471e529104385e5c30ddc46462096d343c76515e1d662
SHA51242b48b4dcd76a8b2200cfafddc064c053a9d1a4b91b81dee9153322c0b2269e4d75f340c1bf7e7750351fb656445efaf1e1fe0f7e543497b247dd3f83f0c86f9
-
Filesize
33KB
MD551a089bf74658f5774db7fb483ec0f6d
SHA1b7f66ab6b8b280bd3dfd46b33384d1873cab8d3e
SHA2564822382013f33b78fe0ee1d8a414a62b2c784a11fa7cb9bbd4c0e9251ced88ce
SHA51216d2846e4682a722ff1d2c347427736f3cdd1a9dd85f7f63b4b1f6777f3daa7e89f948bc44059e0445477a59ad1bdb9c6ba2453e81331f4fdc9b77210fc1bb3c
-
Filesize
9B
MD59810b812fea5407a7c6a6b912eab6de9
SHA1653710a103c34c6d87e85d547de48561b1579927
SHA256497dc92fb09ed6740a1e704ddf5f45daf1d330f0977aaf1142604be15753e7ef
SHA512a23126d1624a391a08931a8f98ec9c26bc5bbe75de0f111bcdbf17b5bbe9bc6e748ca58e52c96fb9ea80509d5ad1c90bf1d92e472b08b2532321106ba1aca2cd