Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe
Resource
win10v2004-20240802-en
General
-
Target
8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe
-
Size
29KB
-
MD5
b060b106c1eb982ca7ca8d85fd599433
-
SHA1
d91b5a5e0939cabe383756bf5d668b0d6c28b4ac
-
SHA256
8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c
-
SHA512
b568001ebd4ef83a37add596c0b107653ea30376d1a83cb3f75577c51a0146270c4f1bee9d6ae1f09ea605e6c6a67763cd9798c198c1885e408862111383f2d3
-
SSDEEP
384:NbbauPW1Gt5M0zhIV/DZ3KZp7JcTO4yf9Knuf2MqlUV2V9wVfUnfRqOzGOnJh:ptPW16GVRu1yK9fMnJG2V9dHS8
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\N: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\I: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\E: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\X: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\R: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\J: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\P: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\O: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\W: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\U: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\M: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\L: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\K: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\H: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\Z: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\Y: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\G: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\S: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\V: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened (read-only) \??\T: 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Games\Minesweeper\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files (x86)\Windows Defender\es-ES\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\1033\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\Microsoft Games\Hearts\ja-JP\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\Windows Sidebar\en-US\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1036\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\es-ES\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENFR\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files (x86)\Windows Media Player\es-ES\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Portal\_desktop.ini 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rundl132.exe 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1700 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe 1700 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe 1700 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe 1700 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe 1700 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe 1700 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe 1700 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe 1700 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe 1700 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe 1700 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1960 1700 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe 30 PID 1700 wrote to memory of 1960 1700 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe 30 PID 1700 wrote to memory of 1960 1700 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe 30 PID 1700 wrote to memory of 1960 1700 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe 30 PID 1960 wrote to memory of 2188 1960 net.exe 32 PID 1960 wrote to memory of 2188 1960 net.exe 32 PID 1960 wrote to memory of 2188 1960 net.exe 32 PID 1960 wrote to memory of 2188 1960 net.exe 32 PID 1700 wrote to memory of 1188 1700 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe 21 PID 1700 wrote to memory of 1188 1700 8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe"C:\Users\Admin\AppData\Local\Temp\8803412d137998746dd5cfb86c58ee63f7136b06eec548cddf016bb17e7b2c8c.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:2188
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
959KB
MD54e340a45d78e6cb60b1f83845ee52175
SHA1c6c77b6412e03da1fe3c69dcb1e9145ffb8d4aff
SHA25613efc51b4f5810f1cd7488e7298c417bda06bb4b18612bb149d34a90c41ae330
SHA51275be2d74a4b3376a26fe0a42cb5794489aeb05eb8aa28f4d4a5d72c22507014bac28421135890edc2d21cc6941ab86453360a5040ba69becfd245d3a2f34d90c
-
Filesize
474KB
MD517e5de36cf448d652adab881a4557ec2
SHA1c45337444120f4cc4a9a65b2bee63cd61618ca2a
SHA25632568fb07078e0d4e77efac9ad862454dba63de5c5f920d9a14de709372f2430
SHA51222678c9ca2d70d9a3377d1f2c6c91d7649adcaccee564acdf1bd6373e60f13f6e21fc09feed5b590475889996287961a1450542741ef0888a4a0b5e9c9812b92
-
Filesize
9B
MD5cd0bf5c2efb8cc7ddbff2ab5d2cb7e87
SHA16830a1817f2055b6beba9063b87af16bbef7fa19
SHA256d00701a279110fcafdaa6a9dcb36385845f9d2aac5b1ac1c52c015c61718dcbd
SHA5126fabfd6bced63153d3dd6b376a92e824c95b15ef046607b89376a17c7ac863e92c95770ed86d8ecec3639d280dd6256a7ab1ec2d8119799fb3a479fbce96254a