Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:09
Static task
static1
Behavioral task
behavioral1
Sample
20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe
Resource
win10v2004-20240802-en
General
-
Target
20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe
-
Size
26KB
-
MD5
70d4176c1c7ea7039b3b5446bb28e756
-
SHA1
58bf39974eae416d4fbe6da9ecd647d01a64dc5f
-
SHA256
20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db
-
SHA512
721e3a09fe766ae437ec58db26798a3521c7ee6c6d564c680c2e343858ed5c063000bc259e64b8bc34313c0ce3f31b480b0165d097a3790d8f284e17891b421d
-
SSDEEP
768:utb1ODKAaDMG8H92RwZNQSwcfymNBg+g61Go0ssQ:AfgLdQAQfcfymN
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\K: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\M: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\H: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\G: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\T: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\S: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\R: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\Q: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\Z: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\P: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\O: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\N: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\L: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\J: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\I: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\E: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\X: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\W: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\V: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened (read-only) \??\U: 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Media Player\wmpconfig.exe 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\DVD Maker\fr-FR\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\Microsoft Games\Solitaire\ja-JP\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\7-Zip\7z.exe 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\keystore\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files (x86)\Internet Explorer\es-ES\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\VideoLAN\VLC\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or_IN\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\DVD Maker\es-ES\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\VideoLAN\VLC\locale\eo\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files (x86)\Common Files\microsoft shared\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\de-DE\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\Java\jdk1.7.0_80\db\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\be\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\_desktop.ini 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rundl132.exe 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2508 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe 2508 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe 2508 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe 2508 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe 2508 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe 2508 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe 2508 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe 2508 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe 2508 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe 2508 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2508 wrote to memory of 1320 2508 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe 30 PID 2508 wrote to memory of 1320 2508 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe 30 PID 2508 wrote to memory of 1320 2508 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe 30 PID 2508 wrote to memory of 1320 2508 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe 30 PID 1320 wrote to memory of 2540 1320 net.exe 32 PID 1320 wrote to memory of 2540 1320 net.exe 32 PID 1320 wrote to memory of 2540 1320 net.exe 32 PID 1320 wrote to memory of 2540 1320 net.exe 32 PID 2508 wrote to memory of 1180 2508 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe 21 PID 2508 wrote to memory of 1180 2508 20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe"C:\Users\Admin\AppData\Local\Temp\20de04ec35e4476ef9b009469791f672bb29aff69285f8ff1871bc89c7d7d1db.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:2540
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD58b898d581e907caf3660a40839fa5a1d
SHA138419b4d9d9245c11d990de6af70afd07199984d
SHA2565804ee850f13a18d40823e26cdc395a31478de2b25a75e773bc6784a2d7b3f4c
SHA5121efb8fc9b774d269bb972f58b39338c4b85ea95f7610752c9f286540722be617e081511d7e5f356de9ee4ec25c807290dd250855221a181986aa739da23f38f5
-
Filesize
956KB
MD5e8493156a3b7d765969f114809c4828b
SHA10888da3b9d171fe48f53461da2e9d27ff0c13387
SHA256be29ef3bec341bcfc94faf7e0ae5889bd5766bee62997a28b3a269d1a9a7eaf7
SHA51277cb82894428ffcc18879d2b6b5ae96f6c86a1965425b8b72a48adf32c8d1fb1d3afeb77cb329b344b8767caa62787b9759f10faa30112708eee1d25ef4c9946
-
Filesize
471KB
MD5fce01a67577fb7ed0e3e01dad325c7ea
SHA1e120f2e97491465d6cd86700fb30830214d9f8ab
SHA256e23cc73613a5c5ce0937c9c9b219ba3f777b7e27a385e12280b570ade7144842
SHA512823ad15be7d6f243b35016746481e1e53714e625cc621eeb3a82163fa2402e2ea4be2c076d0f0ca178cf99537e879b8b8142a939b299b14ad4efc49db23156d8
-
Filesize
9B
MD582fa69b12ac2df558c85e86426eb13eb
SHA1ad90b8756e3bebe04450f6950419c761844d7b7e
SHA256f7622a3740b818722e46a36b5aeb1c0ba6bec25bec811e3dcfe0b5ba1d728775
SHA5123c4da39d3b0d68ade3ff8ded69bf1e78a1ef88f7ed70c85572ae06e6be78155ffc2f557f577208e579191be2d8be2a1fa833b9ca74a35bb69cf9c32c23f4d99f