Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2023, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
888ccbb86db9254546f4dd7639b37418f63373c6231445df8db2a83fc299a295.exe
Resource
win10v2004-20230703-en
General
-
Target
888ccbb86db9254546f4dd7639b37418f63373c6231445df8db2a83fc299a295.exe
-
Size
704KB
-
MD5
f073c8bdc8ccbd4c86279e248e56e416
-
SHA1
fa54963af7269346926b9d742f79481ee0655d41
-
SHA256
888ccbb86db9254546f4dd7639b37418f63373c6231445df8db2a83fc299a295
-
SHA512
b92c594995ac34453fa6599fcc6aaa6cda74b82074f51772431966effd002f87d6ee4a5e6488aa44bb4bb60bb31c5c19705e969901e4b818f804c1051067f30d
-
SSDEEP
12288:4MrLy90BHs+f49WTUzTKhBD+Kte6rG55gnuWsJvovJiNeD9s7XW+:zyOJAwTUn8BDzte6rGfgRYrl
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
rota
77.91.124.73:19071
-
auth_value
320c7daa59eb9b82e20a15162392a756
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0008000000023266-159.dat healer behavioral1/files/0x0008000000023266-160.dat healer behavioral1/memory/3668-161-0x0000000000AF0000-0x0000000000AFA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g0635736.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g0635736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g0635736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g0635736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g0635736.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g0635736.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 1868 x5921771.exe 4896 x7856047.exe 4124 x5775230.exe 3668 g0635736.exe 1220 h9796293.exe 1708 saves.exe 3584 i1163447.exe 4808 saves.exe 8 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 2372 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g0635736.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5775230.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 888ccbb86db9254546f4dd7639b37418f63373c6231445df8db2a83fc299a295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5921771.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7856047.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2616 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3668 g0635736.exe 3668 g0635736.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3668 g0635736.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4420 wrote to memory of 1868 4420 888ccbb86db9254546f4dd7639b37418f63373c6231445df8db2a83fc299a295.exe 81 PID 4420 wrote to memory of 1868 4420 888ccbb86db9254546f4dd7639b37418f63373c6231445df8db2a83fc299a295.exe 81 PID 4420 wrote to memory of 1868 4420 888ccbb86db9254546f4dd7639b37418f63373c6231445df8db2a83fc299a295.exe 81 PID 1868 wrote to memory of 4896 1868 x5921771.exe 82 PID 1868 wrote to memory of 4896 1868 x5921771.exe 82 PID 1868 wrote to memory of 4896 1868 x5921771.exe 82 PID 4896 wrote to memory of 4124 4896 x7856047.exe 83 PID 4896 wrote to memory of 4124 4896 x7856047.exe 83 PID 4896 wrote to memory of 4124 4896 x7856047.exe 83 PID 4124 wrote to memory of 3668 4124 x5775230.exe 84 PID 4124 wrote to memory of 3668 4124 x5775230.exe 84 PID 4124 wrote to memory of 1220 4124 x5775230.exe 93 PID 4124 wrote to memory of 1220 4124 x5775230.exe 93 PID 4124 wrote to memory of 1220 4124 x5775230.exe 93 PID 1220 wrote to memory of 1708 1220 h9796293.exe 94 PID 1220 wrote to memory of 1708 1220 h9796293.exe 94 PID 1220 wrote to memory of 1708 1220 h9796293.exe 94 PID 4896 wrote to memory of 3584 4896 x7856047.exe 96 PID 4896 wrote to memory of 3584 4896 x7856047.exe 96 PID 4896 wrote to memory of 3584 4896 x7856047.exe 96 PID 1708 wrote to memory of 2616 1708 saves.exe 97 PID 1708 wrote to memory of 2616 1708 saves.exe 97 PID 1708 wrote to memory of 2616 1708 saves.exe 97 PID 1708 wrote to memory of 3764 1708 saves.exe 99 PID 1708 wrote to memory of 3764 1708 saves.exe 99 PID 1708 wrote to memory of 3764 1708 saves.exe 99 PID 3764 wrote to memory of 1580 3764 cmd.exe 101 PID 3764 wrote to memory of 1580 3764 cmd.exe 101 PID 3764 wrote to memory of 1580 3764 cmd.exe 101 PID 3764 wrote to memory of 3036 3764 cmd.exe 102 PID 3764 wrote to memory of 3036 3764 cmd.exe 102 PID 3764 wrote to memory of 3036 3764 cmd.exe 102 PID 3764 wrote to memory of 2976 3764 cmd.exe 103 PID 3764 wrote to memory of 2976 3764 cmd.exe 103 PID 3764 wrote to memory of 2976 3764 cmd.exe 103 PID 3764 wrote to memory of 3740 3764 cmd.exe 104 PID 3764 wrote to memory of 3740 3764 cmd.exe 104 PID 3764 wrote to memory of 3740 3764 cmd.exe 104 PID 3764 wrote to memory of 1200 3764 cmd.exe 105 PID 3764 wrote to memory of 1200 3764 cmd.exe 105 PID 3764 wrote to memory of 1200 3764 cmd.exe 105 PID 3764 wrote to memory of 1500 3764 cmd.exe 106 PID 3764 wrote to memory of 1500 3764 cmd.exe 106 PID 3764 wrote to memory of 1500 3764 cmd.exe 106 PID 1708 wrote to memory of 2372 1708 saves.exe 108 PID 1708 wrote to memory of 2372 1708 saves.exe 108 PID 1708 wrote to memory of 2372 1708 saves.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\888ccbb86db9254546f4dd7639b37418f63373c6231445df8db2a83fc299a295.exe"C:\Users\Admin\AppData\Local\Temp\888ccbb86db9254546f4dd7639b37418f63373c6231445df8db2a83fc299a295.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5921771.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5921771.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7856047.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7856047.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5775230.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5775230.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0635736.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0635736.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9796293.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9796293.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:2616
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1580
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:3036
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3740
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:1200
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:1500
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:2372
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1163447.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1163447.exe4⤵
- Executes dropped EXE
PID:3584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4808
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:8
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD5a73b5dc742566244f5b9f1e8fdcb59b0
SHA160779e9636f5b5f917918ab2f87028b415921ed8
SHA256d55f41a72ff913aab2b68ebe9209284437b50b89080c51cb82dfdc5ef5e8111d
SHA5123eb7d16994d97d805031a03f1c0766e2657baeebeb7ac65d6c5c0e28c1c82c0f9d03af3e0d9a1f8de48cb6313200bb96d291a48fd3c3c0f2b4da97ede39f6734
-
Filesize
598KB
MD5a73b5dc742566244f5b9f1e8fdcb59b0
SHA160779e9636f5b5f917918ab2f87028b415921ed8
SHA256d55f41a72ff913aab2b68ebe9209284437b50b89080c51cb82dfdc5ef5e8111d
SHA5123eb7d16994d97d805031a03f1c0766e2657baeebeb7ac65d6c5c0e28c1c82c0f9d03af3e0d9a1f8de48cb6313200bb96d291a48fd3c3c0f2b4da97ede39f6734
-
Filesize
433KB
MD5331fd936e02c3349e868ab51feb13f1f
SHA1703f0aa7204aef9ce74daf25b142c42ccb990b4d
SHA256e69d9ac0a96dc3ff05456ea0e38ef1af0bce5e305bab1df6cb5d5fa951dd12c1
SHA512fc83aaa950abca07a1ae1eb80fe8389ce36b86b0e84b7625bf8352de8c65616746207ca07191a865481f3a53ce036ef26e7c47d807f7b7d9a6e27f22f06f7872
-
Filesize
433KB
MD5331fd936e02c3349e868ab51feb13f1f
SHA1703f0aa7204aef9ce74daf25b142c42ccb990b4d
SHA256e69d9ac0a96dc3ff05456ea0e38ef1af0bce5e305bab1df6cb5d5fa951dd12c1
SHA512fc83aaa950abca07a1ae1eb80fe8389ce36b86b0e84b7625bf8352de8c65616746207ca07191a865481f3a53ce036ef26e7c47d807f7b7d9a6e27f22f06f7872
-
Filesize
174KB
MD56cf3d406fad79373b8fe29929d70a09f
SHA1ff549a71c8b8d3a8a5b125237d7420b3fe42dbda
SHA25656c0d4681301ed5e5501d33c25ef2cad14d85aa25af7527d044f657c2040ddc7
SHA51210ffb5989902988f6fa7113d33685d0002ce7788a9ddd6fd112168eb57ae843a29f3b38d4b50783946d4ee5e989ccef5ea4dc8b82d2f6338d8e41ef1d2483df9
-
Filesize
174KB
MD56cf3d406fad79373b8fe29929d70a09f
SHA1ff549a71c8b8d3a8a5b125237d7420b3fe42dbda
SHA25656c0d4681301ed5e5501d33c25ef2cad14d85aa25af7527d044f657c2040ddc7
SHA51210ffb5989902988f6fa7113d33685d0002ce7788a9ddd6fd112168eb57ae843a29f3b38d4b50783946d4ee5e989ccef5ea4dc8b82d2f6338d8e41ef1d2483df9
-
Filesize
277KB
MD5ac1ab477bcbe3157eab1f41315ab1094
SHA15090f19084d40ee457a25bf2afd26171bc460082
SHA2568722e9e555909f2f9a2d0ca7f6978cbae5e40b12619daefeb8a08c1334e73dda
SHA512fa8cabe839c0aa8667cd260042ad477ff888d35bb2d50ab30675717c1d7283b4ac0b90035bdbd81b5aac8c298d11f73d9e979edc1450b97ad19d0dd78c1162ce
-
Filesize
277KB
MD5ac1ab477bcbe3157eab1f41315ab1094
SHA15090f19084d40ee457a25bf2afd26171bc460082
SHA2568722e9e555909f2f9a2d0ca7f6978cbae5e40b12619daefeb8a08c1334e73dda
SHA512fa8cabe839c0aa8667cd260042ad477ff888d35bb2d50ab30675717c1d7283b4ac0b90035bdbd81b5aac8c298d11f73d9e979edc1450b97ad19d0dd78c1162ce
-
Filesize
12KB
MD5750e737af40a8a8594ba22fea1cdadae
SHA19abda3d65ed707b98dcf5e0d6d674fa94b518104
SHA256ae87b95ff830c1e868a702160465dda6d6c4fd690a30cafefcf7dc21986aefc0
SHA5128e4a9fec2e0f6a34179c2acee977422e280176608673a3dcde13ebaf34e5a4976256bfadbb9a46aa0c606eb69ace531522f561b945879b724fa1cb0aa2c22cc4
-
Filesize
12KB
MD5750e737af40a8a8594ba22fea1cdadae
SHA19abda3d65ed707b98dcf5e0d6d674fa94b518104
SHA256ae87b95ff830c1e868a702160465dda6d6c4fd690a30cafefcf7dc21986aefc0
SHA5128e4a9fec2e0f6a34179c2acee977422e280176608673a3dcde13ebaf34e5a4976256bfadbb9a46aa0c606eb69ace531522f561b945879b724fa1cb0aa2c22cc4
-
Filesize
315KB
MD5ce6d6b508086bd1fdeb08e88d848d740
SHA11cdd7496bb32fbfc49e1ae58b5910db9b675818e
SHA25626ed9f4bef195e77e1b5b84b490a30de83b0945bee18e477b606565d37ae4421
SHA51241182cbc54561cc042eb20ef1d5d16b163e50a119d4a789bdc3a3c9455e05e490b5b12791e95933bb0ba8d702cde10c7808c4c6bc52cf43a455f245f862a305f
-
Filesize
315KB
MD5ce6d6b508086bd1fdeb08e88d848d740
SHA11cdd7496bb32fbfc49e1ae58b5910db9b675818e
SHA25626ed9f4bef195e77e1b5b84b490a30de83b0945bee18e477b606565d37ae4421
SHA51241182cbc54561cc042eb20ef1d5d16b163e50a119d4a789bdc3a3c9455e05e490b5b12791e95933bb0ba8d702cde10c7808c4c6bc52cf43a455f245f862a305f
-
Filesize
315KB
MD5ce6d6b508086bd1fdeb08e88d848d740
SHA11cdd7496bb32fbfc49e1ae58b5910db9b675818e
SHA25626ed9f4bef195e77e1b5b84b490a30de83b0945bee18e477b606565d37ae4421
SHA51241182cbc54561cc042eb20ef1d5d16b163e50a119d4a789bdc3a3c9455e05e490b5b12791e95933bb0ba8d702cde10c7808c4c6bc52cf43a455f245f862a305f
-
Filesize
315KB
MD5ce6d6b508086bd1fdeb08e88d848d740
SHA11cdd7496bb32fbfc49e1ae58b5910db9b675818e
SHA25626ed9f4bef195e77e1b5b84b490a30de83b0945bee18e477b606565d37ae4421
SHA51241182cbc54561cc042eb20ef1d5d16b163e50a119d4a789bdc3a3c9455e05e490b5b12791e95933bb0ba8d702cde10c7808c4c6bc52cf43a455f245f862a305f
-
Filesize
315KB
MD5ce6d6b508086bd1fdeb08e88d848d740
SHA11cdd7496bb32fbfc49e1ae58b5910db9b675818e
SHA25626ed9f4bef195e77e1b5b84b490a30de83b0945bee18e477b606565d37ae4421
SHA51241182cbc54561cc042eb20ef1d5d16b163e50a119d4a789bdc3a3c9455e05e490b5b12791e95933bb0ba8d702cde10c7808c4c6bc52cf43a455f245f862a305f
-
Filesize
315KB
MD5ce6d6b508086bd1fdeb08e88d848d740
SHA11cdd7496bb32fbfc49e1ae58b5910db9b675818e
SHA25626ed9f4bef195e77e1b5b84b490a30de83b0945bee18e477b606565d37ae4421
SHA51241182cbc54561cc042eb20ef1d5d16b163e50a119d4a789bdc3a3c9455e05e490b5b12791e95933bb0ba8d702cde10c7808c4c6bc52cf43a455f245f862a305f
-
Filesize
315KB
MD5ce6d6b508086bd1fdeb08e88d848d740
SHA11cdd7496bb32fbfc49e1ae58b5910db9b675818e
SHA25626ed9f4bef195e77e1b5b84b490a30de83b0945bee18e477b606565d37ae4421
SHA51241182cbc54561cc042eb20ef1d5d16b163e50a119d4a789bdc3a3c9455e05e490b5b12791e95933bb0ba8d702cde10c7808c4c6bc52cf43a455f245f862a305f
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7