Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe
Resource
win7-20240903-en
General
-
Target
c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe
-
Size
74KB
-
MD5
0fc9efbabada360210f3993b7aa27cae
-
SHA1
46fd964c5efb510b9917dc3ae97abe6196de2d9e
-
SHA256
c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343
-
SHA512
b42d90d13e1e4472501f709ac6532bc3935caafb53049e6c0f4951245105db6b33452f5a6efb564c1aa9ea13e2906294e0a52b7408d325a0af2493fee50916d9
-
SSDEEP
1536:DCG5cx1aeg1vlxJYDf97EToa9D4ZQKbgZi1dst7x9PxQ:+G5f9zYVlZQKbgZi1St7xQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2448 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2272 Logo1_.exe 2420 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe -
Loads dropped DLL 1 IoCs
pid Process 2448 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es_MX\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EVRGREEN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\images\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe File created C:\Windows\Logo1_.exe c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe 2272 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3028 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 28 PID 2908 wrote to memory of 3028 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 28 PID 2908 wrote to memory of 3028 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 28 PID 2908 wrote to memory of 3028 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 28 PID 3028 wrote to memory of 2764 3028 net.exe 30 PID 3028 wrote to memory of 2764 3028 net.exe 30 PID 3028 wrote to memory of 2764 3028 net.exe 30 PID 3028 wrote to memory of 2764 3028 net.exe 30 PID 2908 wrote to memory of 2448 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 31 PID 2908 wrote to memory of 2448 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 31 PID 2908 wrote to memory of 2448 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 31 PID 2908 wrote to memory of 2448 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 31 PID 2908 wrote to memory of 2272 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 33 PID 2908 wrote to memory of 2272 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 33 PID 2908 wrote to memory of 2272 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 33 PID 2908 wrote to memory of 2272 2908 c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe 33 PID 2272 wrote to memory of 1932 2272 Logo1_.exe 34 PID 2272 wrote to memory of 1932 2272 Logo1_.exe 34 PID 2272 wrote to memory of 1932 2272 Logo1_.exe 34 PID 2272 wrote to memory of 1932 2272 Logo1_.exe 34 PID 1932 wrote to memory of 2404 1932 net.exe 36 PID 1932 wrote to memory of 2404 1932 net.exe 36 PID 1932 wrote to memory of 2404 1932 net.exe 36 PID 1932 wrote to memory of 2404 1932 net.exe 36 PID 2448 wrote to memory of 2420 2448 cmd.exe 37 PID 2448 wrote to memory of 2420 2448 cmd.exe 37 PID 2448 wrote to memory of 2420 2448 cmd.exe 37 PID 2448 wrote to memory of 2420 2448 cmd.exe 37 PID 2272 wrote to memory of 2768 2272 Logo1_.exe 38 PID 2272 wrote to memory of 2768 2272 Logo1_.exe 38 PID 2272 wrote to memory of 2768 2272 Logo1_.exe 38 PID 2272 wrote to memory of 2768 2272 Logo1_.exe 38 PID 2768 wrote to memory of 2572 2768 net.exe 40 PID 2768 wrote to memory of 2572 2768 net.exe 40 PID 2768 wrote to memory of 2572 2768 net.exe 40 PID 2768 wrote to memory of 2572 2768 net.exe 40 PID 2272 wrote to memory of 1196 2272 Logo1_.exe 21 PID 2272 wrote to memory of 1196 2272 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe"C:\Users\Admin\AppData\Local\Temp\c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aA46A.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe"C:\Users\Admin\AppData\Local\Temp\c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe"4⤵
- Executes dropped EXE
PID:2420
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2572
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD516e19604c35898365f8f791b0ce839b4
SHA1a30ba6cdb303c12372210475b328949f52664374
SHA2568ba99e5f289dede0fbb920ac585ec359c55035acce32cb23af9b83031e7273ff
SHA5121fe473c75a7228d01d8fe44150101a60055fb7fb9f675300199622391322161bf1e06edc27ea4e25bfa0e86ad3bc3c900d098d277426bb765ecdc644023926ff
-
Filesize
722B
MD56e585377c015e040aab5ca1170f0d46a
SHA16188c34e321ec75dcb171aa52c6c7d888dc6e572
SHA25687d5c83c4965e1b1ba5be454c3b85fd09ab25e33e3143ffcb3d1ceb205c058ab
SHA5126cd31cc0e5900b82bc9611046fcd37a9e5c9d083456c6a296b3331677a061af5309b882ee3e015dd22b752b3cd47e328afd25ba5db33c186a051aec6f29fc75c
-
C:\Users\Admin\AppData\Local\Temp\c3c1d25083a96bb50a010c06655ad424260fbd79119c601a155f0c6e81985343.exe.exe
Filesize41KB
MD5977e405c109268909fd24a94cc23d4f0
SHA1af5d032c2b6caa2164cf298e95b09060665c4188
SHA256cd24c61fe7dc3896c6c928c92a2adc58fab0a3ff61ef7ddcac1ba794182ab12f
SHA51212b4b59c1a8e65e72aa07ee4b6b6cd9fdedead01d5ce8e30f16ca26b5d733655e23a71c1d273a950a5b1a6cce810b696612de4a1148ac5f468ddf05d4549eed5
-
Filesize
33KB
MD59fb383006ea88e23b6927523f8ea7a4a
SHA1a408f9bad16cfe8f36bba778a0efb645f901273a
SHA2563c188d42969203e83dad09e7d67c63cfee5a6f7beee1d502108df9797ca08c29
SHA51265d558ece19fcfd206188f05318183ee0919f327d6c2d8a3611edcecd8d602086f2cb209b51d2d66f7de1f2d64213479e983f57693827fcd2d20aa117e586b8b
-
Filesize
10B
MD521df1f2862abbefb19b69ed364a5f968
SHA16e5a47eaef1ac9d9f355a10e4de11de5b252e6fd
SHA256061a173d684fb8122f34b91ded168a81a20864be4dc9ee219ee65f9007d22fe6
SHA5123364df22ff99814a7f520711ff71f3dd96f9611d954f7a11edfdb846f8c6703eea5fcadf5485a35564670bc6a484a3dd0f8a45c746dbc919d478d067e1b80567