Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2023 10:27
Static task
static1
Behavioral task
behavioral1
Sample
a647409c07ea6ea0636b4e5eac9253e7b86b1580da0ed.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a647409c07ea6ea0636b4e5eac9253e7b86b1580da0ed.exe
Resource
win10v2004-20230703-en
General
-
Target
a647409c07ea6ea0636b4e5eac9253e7b86b1580da0ed.exe
-
Size
831KB
-
MD5
d9b9ad9e1bccfc9a3027d309246e451f
-
SHA1
6883c6e7ab1aab7c0b6493e020e9ddb33debc665
-
SHA256
a647409c07ea6ea0636b4e5eac9253e7b86b1580da0ed14bc86734f12ab58b2c
-
SHA512
6698386657dc367ce75f935ca8748d6a048023c3676271b59a543977c9ae8e86e2e75d064e1a0d3939c77c194a8c2225b83f6e53a05fde05e9c6b5076a696ea9
-
SSDEEP
12288:gMr7y90+AxDSTvGZZTLMwiAtaJFiKpwe7Vh3KRpVXop7vwr+/WackDNWYxMpyqgy:ryKxDZ+k+f7VNKXVQhrBW+Mp7JZ
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
dugin
77.91.124.73:19071
-
auth_value
7c3e46e091100fd26a6076996d374c28
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x00060000000231f9-171.dat healer behavioral2/files/0x00060000000231f9-172.dat healer behavioral2/memory/4372-173-0x0000000000F40000-0x0000000000F4A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h1135042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h1135042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h1135042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h1135042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h1135042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h1135042.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 2956 x2751699.exe 3836 x9555122.exe 3952 x0277606.exe 4700 g8137636.exe 1304 saves.exe 4372 h1135042.exe 3924 i2193336.exe 1072 saves.exe 3204 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4324 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h1135042.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2751699.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9555122.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0277606.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a647409c07ea6ea0636b4e5eac9253e7b86b1580da0ed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1092 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4372 h1135042.exe 4372 h1135042.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4372 h1135042.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4000 wrote to memory of 2956 4000 a647409c07ea6ea0636b4e5eac9253e7b86b1580da0ed.exe 82 PID 4000 wrote to memory of 2956 4000 a647409c07ea6ea0636b4e5eac9253e7b86b1580da0ed.exe 82 PID 4000 wrote to memory of 2956 4000 a647409c07ea6ea0636b4e5eac9253e7b86b1580da0ed.exe 82 PID 2956 wrote to memory of 3836 2956 x2751699.exe 83 PID 2956 wrote to memory of 3836 2956 x2751699.exe 83 PID 2956 wrote to memory of 3836 2956 x2751699.exe 83 PID 3836 wrote to memory of 3952 3836 x9555122.exe 84 PID 3836 wrote to memory of 3952 3836 x9555122.exe 84 PID 3836 wrote to memory of 3952 3836 x9555122.exe 84 PID 3952 wrote to memory of 4700 3952 x0277606.exe 85 PID 3952 wrote to memory of 4700 3952 x0277606.exe 85 PID 3952 wrote to memory of 4700 3952 x0277606.exe 85 PID 4700 wrote to memory of 1304 4700 g8137636.exe 86 PID 4700 wrote to memory of 1304 4700 g8137636.exe 86 PID 4700 wrote to memory of 1304 4700 g8137636.exe 86 PID 3952 wrote to memory of 4372 3952 x0277606.exe 87 PID 3952 wrote to memory of 4372 3952 x0277606.exe 87 PID 1304 wrote to memory of 1092 1304 saves.exe 88 PID 1304 wrote to memory of 1092 1304 saves.exe 88 PID 1304 wrote to memory of 1092 1304 saves.exe 88 PID 1304 wrote to memory of 364 1304 saves.exe 90 PID 1304 wrote to memory of 364 1304 saves.exe 90 PID 1304 wrote to memory of 364 1304 saves.exe 90 PID 364 wrote to memory of 3752 364 cmd.exe 92 PID 364 wrote to memory of 3752 364 cmd.exe 92 PID 364 wrote to memory of 3752 364 cmd.exe 92 PID 364 wrote to memory of 4244 364 cmd.exe 93 PID 364 wrote to memory of 4244 364 cmd.exe 93 PID 364 wrote to memory of 4244 364 cmd.exe 93 PID 364 wrote to memory of 2160 364 cmd.exe 94 PID 364 wrote to memory of 2160 364 cmd.exe 94 PID 364 wrote to memory of 2160 364 cmd.exe 94 PID 364 wrote to memory of 2444 364 cmd.exe 95 PID 364 wrote to memory of 2444 364 cmd.exe 95 PID 364 wrote to memory of 2444 364 cmd.exe 95 PID 364 wrote to memory of 2472 364 cmd.exe 96 PID 364 wrote to memory of 2472 364 cmd.exe 96 PID 364 wrote to memory of 2472 364 cmd.exe 96 PID 364 wrote to memory of 4540 364 cmd.exe 97 PID 364 wrote to memory of 4540 364 cmd.exe 97 PID 364 wrote to memory of 4540 364 cmd.exe 97 PID 3836 wrote to memory of 3924 3836 x9555122.exe 102 PID 3836 wrote to memory of 3924 3836 x9555122.exe 102 PID 3836 wrote to memory of 3924 3836 x9555122.exe 102 PID 1304 wrote to memory of 4324 1304 saves.exe 109 PID 1304 wrote to memory of 4324 1304 saves.exe 109 PID 1304 wrote to memory of 4324 1304 saves.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\a647409c07ea6ea0636b4e5eac9253e7b86b1580da0ed.exe"C:\Users\Admin\AppData\Local\Temp\a647409c07ea6ea0636b4e5eac9253e7b86b1580da0ed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2751699.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2751699.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9555122.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9555122.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0277606.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0277606.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8137636.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8137636.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1092
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3752
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4244
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:2472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:4540
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1135042.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1135042.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2193336.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2193336.exe4⤵
- Executes dropped EXE
PID:3924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1072
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3204
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
597KB
MD59710bc4cd7c64e3724fca6220c8863aa
SHA19442c65ca9615505680e6ea319db10d3a5dcb3f6
SHA25652b2450b285a698f3c790dea1f541ed50f702b3c121300227f7dc5dc72b569d2
SHA5121c5fa8a1b88536a2145dfd49477364555fe78fb3cf9275043e3e45dcd4a7a0fcaafaf757177eeaaff9061e86608daac8c736c0032aaf8723cb0940f1a2b6d739
-
Filesize
597KB
MD59710bc4cd7c64e3724fca6220c8863aa
SHA19442c65ca9615505680e6ea319db10d3a5dcb3f6
SHA25652b2450b285a698f3c790dea1f541ed50f702b3c121300227f7dc5dc72b569d2
SHA5121c5fa8a1b88536a2145dfd49477364555fe78fb3cf9275043e3e45dcd4a7a0fcaafaf757177eeaaff9061e86608daac8c736c0032aaf8723cb0940f1a2b6d739
-
Filesize
431KB
MD5796b559e66a2e785f0d5d40402dfec0b
SHA10f74cc083636defcf5d8d086f562e4d1b7cdfa74
SHA256e09014a6d883fe0ccc226bc29d38b96c9637ac15bbfd1052fdc4a54a8c46bdd5
SHA512c0c733d169c25dc81ff59c84b97813413c190c5241bdbc46939ed437b891f22aed305a596399969f55ddcdc37a18586cf2901047ec815930787b5208b9f99a00
-
Filesize
431KB
MD5796b559e66a2e785f0d5d40402dfec0b
SHA10f74cc083636defcf5d8d086f562e4d1b7cdfa74
SHA256e09014a6d883fe0ccc226bc29d38b96c9637ac15bbfd1052fdc4a54a8c46bdd5
SHA512c0c733d169c25dc81ff59c84b97813413c190c5241bdbc46939ed437b891f22aed305a596399969f55ddcdc37a18586cf2901047ec815930787b5208b9f99a00
-
Filesize
174KB
MD5058a132c58528f1ae939658aa1bdeeee
SHA14aa8375b8362678bcb8e4e37aae360aaa8c933ce
SHA2569afa0741ac96b89219dc9a00d9e7df90ba8df75ecc15f158147f5371a5c28763
SHA512b20061f957dac559ca19771f81f2051b07011df2435c53b5d732bc835cc7494ceee637fdfa3bd6c581a9f828a1e6c1bf2994eeeef64dcc086fba8ece790ae87c
-
Filesize
174KB
MD5058a132c58528f1ae939658aa1bdeeee
SHA14aa8375b8362678bcb8e4e37aae360aaa8c933ce
SHA2569afa0741ac96b89219dc9a00d9e7df90ba8df75ecc15f158147f5371a5c28763
SHA512b20061f957dac559ca19771f81f2051b07011df2435c53b5d732bc835cc7494ceee637fdfa3bd6c581a9f828a1e6c1bf2994eeeef64dcc086fba8ece790ae87c
-
Filesize
276KB
MD5df133e894704b60945ae5b297e1668d3
SHA173fe6025a28def02672b5085c5c2c75ae44b9f9c
SHA256aab780cffdf4928eb5fdeecdada2211b9ef32b62c878cf9b7114c153bd7572ac
SHA512e0f9dcc84431934a45147c7b85c8aeb4faa70312dbe4499733dbbec205d18c9b1ab7ad0b09bc061bcdea2176612df0041685a198eac333a69027919fe36278c4
-
Filesize
276KB
MD5df133e894704b60945ae5b297e1668d3
SHA173fe6025a28def02672b5085c5c2c75ae44b9f9c
SHA256aab780cffdf4928eb5fdeecdada2211b9ef32b62c878cf9b7114c153bd7572ac
SHA512e0f9dcc84431934a45147c7b85c8aeb4faa70312dbe4499733dbbec205d18c9b1ab7ad0b09bc061bcdea2176612df0041685a198eac333a69027919fe36278c4
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7