Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe
Resource
win10v2004-20240802-en
General
-
Target
c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe
-
Size
2.3MB
-
MD5
79ae8800dc1059c4365073f4c15ed5eb
-
SHA1
a9ef66eda37414e731630c15b551cd251da13892
-
SHA256
c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a
-
SHA512
b95edc41bf5609cabf9a104240913004cc6801ad6cab3c22a97fcffa203454564d70740d25b2b8f9e3de5594674711c2b42846eaa4ebdd757d9849afe5cea5e2
-
SSDEEP
49152:J7iuAJld1NwfF0GSYbL+0Joz7ITd2fVy+dlyTTTulk1vOvUM:4uAJld1Nc/P6zud2fVy4lggk2vUM
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2692 Logo1_.exe 2104 c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\applet\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pt-br\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\eu-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\limited\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PSReadline\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\PlayReadyCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\th\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\resources\strings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactNative\Tracing\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\require\2.1.15\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\it-it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Viewer\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ie\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe File created C:\Windows\Logo1_.exe c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2692 Logo1_.exe 2692 Logo1_.exe 2692 Logo1_.exe 2692 Logo1_.exe 2692 Logo1_.exe 2692 Logo1_.exe 2692 Logo1_.exe 2692 Logo1_.exe 2692 Logo1_.exe 2692 Logo1_.exe 2692 Logo1_.exe 2692 Logo1_.exe 2104 c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe 2104 c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe 2692 Logo1_.exe 2692 Logo1_.exe 2692 Logo1_.exe 2692 Logo1_.exe 2692 Logo1_.exe 2692 Logo1_.exe 2692 Logo1_.exe 2692 Logo1_.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2104 c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4644 wrote to memory of 3708 4644 c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe 82 PID 4644 wrote to memory of 3708 4644 c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe 82 PID 4644 wrote to memory of 3708 4644 c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe 82 PID 4644 wrote to memory of 2692 4644 c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe 84 PID 4644 wrote to memory of 2692 4644 c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe 84 PID 4644 wrote to memory of 2692 4644 c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe 84 PID 2692 wrote to memory of 2248 2692 Logo1_.exe 85 PID 2692 wrote to memory of 2248 2692 Logo1_.exe 85 PID 2692 wrote to memory of 2248 2692 Logo1_.exe 85 PID 2248 wrote to memory of 336 2248 net.exe 87 PID 2248 wrote to memory of 336 2248 net.exe 87 PID 2248 wrote to memory of 336 2248 net.exe 87 PID 3708 wrote to memory of 2104 3708 cmd.exe 88 PID 3708 wrote to memory of 2104 3708 cmd.exe 88 PID 3708 wrote to memory of 2104 3708 cmd.exe 88 PID 2692 wrote to memory of 3548 2692 Logo1_.exe 56 PID 2692 wrote to memory of 3548 2692 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe"C:\Users\Admin\AppData\Local\Temp\c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aAAE6.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe"C:\Users\Admin\AppData\Local\Temp\c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2104
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:336
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5e673adf0204e255b2009a33202e6ea32
SHA1e6939a67cde886114f932bad044665a08a345f4c
SHA256e2073fb12bd69849b4977e0f96297d236e9bb59a084955c5b6d26bac2311d18a
SHA5122ee2c7cc83777334e4f841c9b1e08a8d73c5bddd8cf37e00c563f14fe008c4f41f967c4214d9b630963ec031aa07fdc7539df42e23004569fa483d67368e7b1a
-
Filesize
570KB
MD5d33c44159e4e3b67ef1dc299432d84ea
SHA1681efc5896c7cd1f8794239e00a6575768e76779
SHA256a273cab19ac256d5696bf59246f487948fed454a0eb5a0cb57f08210677b7c45
SHA51213db6f7a94d8d45a3889c1ab7be132a5dc7a24588197622a3dc69fc661f62ef00db310457df0c5203c86fb073848c3cf5f860094fe1365033d2880fcbbef26a6
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD5d879045e646040dca7c06605137a7d84
SHA13a9031839b3f018363d1ccf62ce03be2b4635761
SHA2560618d20bec4301d59ba28d10c8ced66cdd052643944d9d52d48fb00aaed2d72f
SHA5120b056908d3ef5448e85833bd3caa5166b923856ae29f091d38325243f4119f7847674559b96bdc15f309666e272a6ce21a28f6af8bdf40446ba21af4440f3d78
-
C:\Users\Admin\AppData\Local\Temp\c3bdd8ddd75e10a6fc012eecb6e7bb46499d53e56e4380700279abd58a03144a.exe.exe
Filesize2.3MB
MD5d424f3972ca2b1f314a037e97d906128
SHA1e4511513afd534c7caab637537ba36752c1b2120
SHA2566faa3a2305217bb7b09b48635f885be4943182279b743ce694361753d49f7e42
SHA512bfe697bc02beacbc16484d60cb1d0268f8ecd0a707a3b1554fdb535130e85d487ea64e5fe098204be7e9b4a11374066178e68d9c727d14a89eefd079ba4ffb1e
-
Filesize
26KB
MD5c474b36ee670d0befb8b3442b383647e
SHA1cbefd636854e54c8ba30014c14a41130bb08f136
SHA256e0f5b3669e539794344317f8000194313e5428a839a76341491c5698dd4b40f6
SHA512ef840ac2b62a7146a699dbcf8101b8619dba97b96ed8c04f0546861d95cb6fa9e2e6cc676e7340d657d9c82071b6ff31c56ba77f76e069a37066a880d3c0a44e
-
Filesize
9B
MD5e02899454c67c7d6d1af854fdcb53b67
SHA126fb213f7c299c2a4d8c4afd234ee0b751d7a30e
SHA2560e67e90646d3ba7b46f935b205c9f89e8bff2dca7aeda3cd5dfb93868b262315
SHA512e1519bebf62ab4cb28e630a201312812e04f815ec0663f7b68b478da97c0bf7c7c2238a8632540d3d1f37acbe83919fb198b39ebeb222c19faa2130ab65ffffa