Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 20:41
Static task
static1
Behavioral task
behavioral1
Sample
ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe
Resource
win10v2004-20241007-en
General
-
Target
ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe
-
Size
137KB
-
MD5
6328dc3740cb460bbeb01f9e1f8c3a96
-
SHA1
75727567341a0b2c441344f60a0b544b68a6212b
-
SHA256
ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149
-
SHA512
6563a6b984280b45fcd77a45c629136b9e21b86e9bc7c5363b6a511ab03c711028198d77cb855829f439dafd9b162255d4a36297e74c27af6057e960c28eb90a
-
SSDEEP
3072:zmftffhJCuU9Cw7vFoF3M9Z8oU8HGROzoTq0+RO7IwnY:KVfhguMCysgZNYkdNwB
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2604 Logo1_.exe 5004 ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\am_ET\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\applet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-200_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sm\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sk-sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Speech\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ru-ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe Logo1_.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\Comprehensive\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\host\fxr\6.0.27\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe File created C:\Windows\Logo1_.exe ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1152 5004 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3484 wrote to memory of 4316 3484 ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe 82 PID 3484 wrote to memory of 4316 3484 ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe 82 PID 3484 wrote to memory of 4316 3484 ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe 82 PID 3484 wrote to memory of 2604 3484 ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe 83 PID 3484 wrote to memory of 2604 3484 ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe 83 PID 3484 wrote to memory of 2604 3484 ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe 83 PID 2604 wrote to memory of 972 2604 Logo1_.exe 85 PID 2604 wrote to memory of 972 2604 Logo1_.exe 85 PID 2604 wrote to memory of 972 2604 Logo1_.exe 85 PID 972 wrote to memory of 840 972 net.exe 87 PID 972 wrote to memory of 840 972 net.exe 87 PID 972 wrote to memory of 840 972 net.exe 87 PID 4316 wrote to memory of 5004 4316 cmd.exe 88 PID 4316 wrote to memory of 5004 4316 cmd.exe 88 PID 4316 wrote to memory of 5004 4316 cmd.exe 88 PID 2604 wrote to memory of 3492 2604 Logo1_.exe 56 PID 2604 wrote to memory of 3492 2604 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe"C:\Users\Admin\AppData\Local\Temp\ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9114.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe"C:\Users\Admin\AppData\Local\Temp\ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe"4⤵
- Executes dropped EXE
PID:5004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 1885⤵
- Program crash
PID:1152
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:840
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5004 -ip 50041⤵PID:2896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD56de96b5772a2c60fcf7079e3aed70290
SHA1ad3652a35d14523c953d9024e1749d113afe535d
SHA2563aa65af27c44381b5ff6fb52e02c432bad09d8eecffaf7574493a37e721d2495
SHA5125d98608d8a000a276646b23cce8379c8db6c639c982d42aa817930947c475403d0cbbf6ed9c02822d57a64f4c1400db8a8f2e99c6b1c82d7418c9c24b5ac19f8
-
Filesize
570KB
MD5d86135ba65a903ea9752fa18663bf2c7
SHA1dec95e10ce9eab4809839a9cf173d43e98982515
SHA2567a8ca8663432023de33793d158c968426c9a802b6a790af44389a3fa77589d5d
SHA512c47c3564d86f6debba6ecfb6b70219e08feb4fa466d9467e16f946188a53e3c1424568665bd6dab22aca20ac8d6feaacc565ee2497be41a0ae7dc072f398a67c
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD5d82ffc872aed7c85cf936dcdcc2e6372
SHA150ca56cb4a429ce1532afaa2732f61833fc2b54f
SHA256a487733710d946abff1a93a23ae6bbafd6c0800bc78e4d5e3cac36e2a14ddace
SHA5120b0031418275c6be01f7757111058cd5bd3e5f4862e0631e2e28c5e7ffbb271446abdc2a88a7953ae55112799bc4a051becc2b14491e0d1760e336498665cc8b
-
Filesize
722B
MD579ebe8809587163bbd74f9a52e6cfea2
SHA17cf596aa7089841fe7219847bfb10d3433dc0ec3
SHA25677726b16d9732d358edbfe603c7d038cfd462c9e6be3801940bc5706b8ea91d4
SHA51276043e65ec800545b1aa0bf79290b579bacf3f6f3ff180f5159ec947598826e5e25eb23a49c1b3fd5e1374ae73189ebd724d4e68b6c9bc59a9a7877bc35764b6
-
C:\Users\Admin\AppData\Local\Temp\ea2bfa8b4a21ed0d5a9007e8697fbadbcd374ab0c8de1e065afe13bea621e149.exe.exe
Filesize110KB
MD5749d138bd977a5203f247af04114c7e7
SHA1f1eacebca8c924515dc08b436eaff21102053836
SHA25654a93e2f5dafb967e5479fac62c07528e3b031077767ded757c15ef125d73e1e
SHA512e1138ff6531895b313c8e18f8b6cad5015e0ac4eb19bf0f0d23081fbc5840dd5b45f017e42d64a003a44dce742883b73ee22a4a48d76741064d0582344aaba97
-
Filesize
26KB
MD51d9a03b6bc232d9d72b32eb0219ddb0d
SHA1cb500e2dd58475f872075b05182ee5c3dbda866d
SHA2566176b6ea8fd27d25a4532882e0ba49ec64d5dd6df1b99e525341f97cd1dd4297
SHA5129f7086101b6073424ac437534b7cf9e9fadd02eba89e12c94bae7ff4d2276ba56f75d638cd046daf989e9adbe1f36342ff89775bfe1f3a3e8875621df23aa055
-
Filesize
10B
MD535c7be4353b2c3d1476bdebcb8e596d4
SHA1de770cbb35d93e9150dd204d9649ca4de42b4663
SHA25659a20d5f7a1a99b8aabad5abbb9a84844abac382745b3da63614d105a7696866
SHA51223561726b3e219f2eeacd5a079a9e9d2d369bfebfc3d11870c8d9e5f107053a680500cb386a896c19b262ea0332eb7e21951367c06662068ee764c8b5db2e575