Overview
overview
10Static
static
100A6172B017F62EAA.exe
windows7-x64
100A6172B017F62EAA.exe
windows10-2004-x64
102891E1D4BAC70EBA.exe
windows7-x64
102891E1D4BAC70EBA.exe
windows10-2004-x64
103472CB2D1AB89AAB.exe
windows7-x64
103472CB2D1AB89AAB.exe
windows10-2004-x64
10613788884CE0093F.exe
windows7-x64
10613788884CE0093F.exe
windows10-2004-x64
107189AED8B8AE6568.exe
windows7-x64
107189AED8B8AE6568.exe
windows10-2004-x64
10CC3B1F89FAA517E4.exe
windows7-x64
10CC3B1F89FAA517E4.exe
windows10-2004-x64
10F5657AC3DC58DC8C.exe
windows7-x64
10F5657AC3DC58DC8C.exe
windows10-2004-x64
10Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 02:01
Behavioral task
behavioral1
Sample
0A6172B017F62EAA.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0A6172B017F62EAA.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
2891E1D4BAC70EBA.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
2891E1D4BAC70EBA.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
3472CB2D1AB89AAB.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
3472CB2D1AB89AAB.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
613788884CE0093F.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
613788884CE0093F.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
7189AED8B8AE6568.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
7189AED8B8AE6568.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
CC3B1F89FAA517E4.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
CC3B1F89FAA517E4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
F5657AC3DC58DC8C.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
F5657AC3DC58DC8C.exe
Resource
win10v2004-20241007-en
General
-
Target
CC3B1F89FAA517E4.exe
-
Size
137KB
-
MD5
4aed4c0e78d355e497f2cc509ff078b5
-
SHA1
31a2ccfd5a679d2badc5fb66f243d4887d9ca444
-
SHA256
ed4e298040946a3be24dcde8303216644c2d2b78444bb1c9bfc7d17c748aeaa5
-
SHA512
bb251af369bd2662caef94ee96147439a75307dbfc30e2b2a63fad75af597e7981c41daec8cedb4326fb0243abbce2b681153380ccec79a38095022b85d4a804
-
SSDEEP
3072:CLIQ8YzXEMZK1A2czbFk58x+o+EFz9/t2f65q8hv2bIoKb:CstYrEMw6Bxk5zOFNtgJSCUb
Malware Config
Extracted
C:\ProgramData\biobio ransmoware.txt
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (9111) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: CC3B1F89FAA517E4.exe File opened (read-only) \??\D: CC3B1F89FAA517E4.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\highDpiImageSwap.js CC3B1F89FAA517E4.exe File created C:\Program Files\VideoLAN\VLC\locale\am\biobio ransmoware.txt CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libcrystalhd_plugin.dll CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.garbagecollector.nl_ja_4.4.0.v20140623020002.jar.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\vlc.mo.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00683_.WMF CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Copenhagen.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-filesystem-l1-1-0.dll.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SEQCHK10.DLL CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00361_.WMF CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0149018.JPG.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Melbourne.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\biobio ransmoware.txt CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\settings.js CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\settings.js CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\bbc_co_uk.luac CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR34F.GIF CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.batik.util_1.7.0.v201011041433.jar.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\invalid32x32.gif CC3B1F89FAA517E4.exe File created C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\biobio ransmoware.txt CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-spi-quicksearch.jar CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Filters\odffilt.dll.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL083.XML.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\EMAIL.DPV.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_right_rest.png CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.beans.nl_ja_4.4.0.v20140623020002.jar CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\settings.js CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00486_.WMF.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\NEWS11.POC.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\.eclipseproduct.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14793_.GIF.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\it-IT\ChkrRes.dll.mui CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\npdeployJava1.dll CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-progress-ui_zh_CN.jar.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jre7\lib\javafx.properties.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01160_.WMF CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107452.WMF.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0241043.WMF CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\jvm.dll.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\biobio ransmoware.txt CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-queries_ja.jar CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\TAB_ON.GIF CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382965.JPG.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0386120.JPG.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0199036.WMF.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18232_.WMF CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\ffjcext.zip CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_output\libamem_plugin.dll CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14692_.GIF CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Bangkok CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD01659_.WMF CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_autodel_plugin.dll.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Novosibirsk CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\clock.css CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGLINACC.DPV CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Cayman CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\ERROR.GIF.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_FormsHomePage.gif.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.text.nl_ja_4.4.0.v20140623020002.jar.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\TABOFF.JPG CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-convert-l1-1-0.dll CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Java\jre7\bin\server\classes.jsa.EMAIL=[[email protected]]ID=[CC3B1F89FAA517E4].biobio CC3B1F89FAA517E4.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\settings.css CC3B1F89FAA517E4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CC3B1F89FAA517E4.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2592 vssadmin.exe 1912 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe 2648 CC3B1F89FAA517E4.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2648 CC3B1F89FAA517E4.exe Token: SeRestorePrivilege 2648 CC3B1F89FAA517E4.exe Token: SeBackupPrivilege 2648 CC3B1F89FAA517E4.exe Token: SeTakeOwnershipPrivilege 2648 CC3B1F89FAA517E4.exe Token: SeAuditPrivilege 2648 CC3B1F89FAA517E4.exe Token: SeSecurityPrivilege 2648 CC3B1F89FAA517E4.exe Token: SeIncBasePriorityPrivilege 2648 CC3B1F89FAA517E4.exe Token: SeBackupPrivilege 2556 vssvc.exe Token: SeRestorePrivilege 2556 vssvc.exe Token: SeAuditPrivilege 2556 vssvc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2752 2648 CC3B1F89FAA517E4.exe 31 PID 2648 wrote to memory of 2752 2648 CC3B1F89FAA517E4.exe 31 PID 2648 wrote to memory of 2752 2648 CC3B1F89FAA517E4.exe 31 PID 2648 wrote to memory of 2752 2648 CC3B1F89FAA517E4.exe 31 PID 2752 wrote to memory of 2592 2752 cmd.exe 33 PID 2752 wrote to memory of 2592 2752 cmd.exe 33 PID 2752 wrote to memory of 2592 2752 cmd.exe 33 PID 2648 wrote to memory of 2876 2648 CC3B1F89FAA517E4.exe 38 PID 2648 wrote to memory of 2876 2648 CC3B1F89FAA517E4.exe 38 PID 2648 wrote to memory of 2876 2648 CC3B1F89FAA517E4.exe 38 PID 2648 wrote to memory of 2876 2648 CC3B1F89FAA517E4.exe 38 PID 2876 wrote to memory of 1912 2876 cmd.exe 40 PID 2876 wrote to memory of 1912 2876 cmd.exe 40 PID 2876 wrote to memory of 1912 2876 cmd.exe 40 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CC3B1F89FAA517E4.exe"C:\Users\Admin\AppData\Local\Temp\CC3B1F89FAA517E4.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2592
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1912
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2556
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402B
MD535e12534b477dbbc950008d0b9e48b2f
SHA18c8915df37f9345ccdf65df19401955a666adabd
SHA256e296f4114f97cd3dfbbe03ea3ffbeb2d53578a417c9e9d02c6f6ac850b96c85c
SHA5124842b68f65b5399cff2235d00e84976bd95a56fb739d3dadee451a1fc8469fb2941ba3f899c59a2dcaff4766585bdab19e9344d44adbb85c5c7302dc865b6fab