Analysis
-
max time kernel
28s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2023 23:23
Behavioral task
behavioral1
Sample
229df5fd5f850d26bb0b0a05f0918e9a.exe
Resource
win7-20230712-en
General
-
Target
229df5fd5f850d26bb0b0a05f0918e9a.exe
-
Size
4.0MB
-
MD5
229df5fd5f850d26bb0b0a05f0918e9a
-
SHA1
400871984e6d833956f06734d7be5d8b7c8cb997
-
SHA256
4b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
-
SHA512
1d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
SSDEEP
98304:dCUPT4Mzeh+6D6UH+phuRO5bezZvSZ0NOk/Lg8eSjD:dCwe4O7H45bezZvIaOk/LgbSjD
Malware Config
Extracted
amadey
3.80
45.15.156.208/jd9dd3Vw/index.php
second.amadgood.com/jd9dd3Vw/index.php
Extracted
laplas
http://206.189.229.43
-
api_key
f52a5c9bc5eb2f51b22f04f3e85c301ac0170a650de6044773f0a8309fbdfb79
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3836-183-0x0000000000400000-0x000000000045A000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1280 created 3164 1280 rdpcllp.exe 53 -
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Executes dropped EXE 4 IoCs
pid Process 3788 oneetx.exe 4264 taskmask.exe 1280 rdpcllp.exe 4668 taskhostclp.exe -
resource yara_rule behavioral2/memory/5088-0-0x00000000009C0000-0x0000000001015000-memory.dmp vmprotect behavioral2/files/0x0006000000023220-7.dat vmprotect behavioral2/files/0x0006000000023220-14.dat vmprotect behavioral2/memory/3788-15-0x00000000005D0000-0x0000000000C25000-memory.dmp vmprotect behavioral2/files/0x0006000000023220-18.dat vmprotect -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" taskhostclp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4668 taskhostclp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4264 set thread context of 3836 4264 taskmask.exe 105 -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 456 sc.exe 2012 sc.exe 3324 sc.exe 4160 sc.exe 1992 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1312 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 43 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1280 rdpcllp.exe 1280 rdpcllp.exe 4264 taskmask.exe 4264 taskmask.exe 1280 rdpcllp.exe 1280 rdpcllp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4264 taskmask.exe Token: SeDebugPrivilege 3836 InstallUtil.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5088 229df5fd5f850d26bb0b0a05f0918e9a.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 5088 wrote to memory of 3788 5088 229df5fd5f850d26bb0b0a05f0918e9a.exe 83 PID 5088 wrote to memory of 3788 5088 229df5fd5f850d26bb0b0a05f0918e9a.exe 83 PID 5088 wrote to memory of 3788 5088 229df5fd5f850d26bb0b0a05f0918e9a.exe 83 PID 3788 wrote to memory of 1312 3788 oneetx.exe 84 PID 3788 wrote to memory of 1312 3788 oneetx.exe 84 PID 3788 wrote to memory of 1312 3788 oneetx.exe 84 PID 3788 wrote to memory of 556 3788 oneetx.exe 86 PID 3788 wrote to memory of 556 3788 oneetx.exe 86 PID 3788 wrote to memory of 556 3788 oneetx.exe 86 PID 556 wrote to memory of 4748 556 cmd.exe 88 PID 556 wrote to memory of 4748 556 cmd.exe 88 PID 556 wrote to memory of 4748 556 cmd.exe 88 PID 556 wrote to memory of 1604 556 cmd.exe 89 PID 556 wrote to memory of 1604 556 cmd.exe 89 PID 556 wrote to memory of 1604 556 cmd.exe 89 PID 556 wrote to memory of 2220 556 cmd.exe 90 PID 556 wrote to memory of 2220 556 cmd.exe 90 PID 556 wrote to memory of 2220 556 cmd.exe 90 PID 556 wrote to memory of 932 556 cmd.exe 91 PID 556 wrote to memory of 932 556 cmd.exe 91 PID 556 wrote to memory of 932 556 cmd.exe 91 PID 556 wrote to memory of 3604 556 cmd.exe 92 PID 556 wrote to memory of 3604 556 cmd.exe 92 PID 556 wrote to memory of 3604 556 cmd.exe 92 PID 556 wrote to memory of 1748 556 cmd.exe 93 PID 556 wrote to memory of 1748 556 cmd.exe 93 PID 556 wrote to memory of 1748 556 cmd.exe 93 PID 3788 wrote to memory of 4264 3788 oneetx.exe 97 PID 3788 wrote to memory of 4264 3788 oneetx.exe 97 PID 3788 wrote to memory of 4264 3788 oneetx.exe 97 PID 3788 wrote to memory of 1280 3788 oneetx.exe 100 PID 3788 wrote to memory of 1280 3788 oneetx.exe 100 PID 3788 wrote to memory of 4668 3788 oneetx.exe 102 PID 3788 wrote to memory of 4668 3788 oneetx.exe 102 PID 4264 wrote to memory of 2368 4264 taskmask.exe 104 PID 4264 wrote to memory of 2368 4264 taskmask.exe 104 PID 4264 wrote to memory of 2368 4264 taskmask.exe 104 PID 4264 wrote to memory of 3836 4264 taskmask.exe 105 PID 4264 wrote to memory of 3836 4264 taskmask.exe 105 PID 4264 wrote to memory of 3836 4264 taskmask.exe 105 PID 4264 wrote to memory of 3836 4264 taskmask.exe 105 PID 4264 wrote to memory of 3836 4264 taskmask.exe 105 PID 4264 wrote to memory of 3836 4264 taskmask.exe 105 PID 4264 wrote to memory of 3836 4264 taskmask.exe 105 PID 4264 wrote to memory of 3836 4264 taskmask.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\229df5fd5f850d26bb0b0a05f0918e9a.exe"C:\Users\Admin\AppData\Local\Temp\229df5fd5f850d26bb0b0a05f0918e9a.exe"2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\eb0f58bce7\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1312
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\eb0f58bce7" /P "Admin:N"&&CACLS "..\eb0f58bce7" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1604
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:932
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\eb0f58bce7" /P "Admin:N"5⤵PID:3604
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\eb0f58bce7" /P "Admin:R" /E5⤵PID:1748
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000149001\taskmask.exe"C:\Users\Admin\AppData\Local\Temp\1000149001\taskmask.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵PID:2368
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000150101\rdpcllp.exe"C:\Users\Admin\AppData\Local\Temp\1000150101\rdpcllp.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\1000151001\taskhostclp.exe"C:\Users\Admin\AppData\Local\Temp\1000151001\taskhostclp.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4668 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe5⤵PID:3176
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵PID:956
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:3160
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:456
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2012
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:3324
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:4160
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1992
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#fyhjjuwy#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵PID:4400
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4876
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:2532
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:1472
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:3224
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:2888
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:3352
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵PID:4404
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
832KB
MD5b8cac40e98b10f2b020d781bfcde7470
SHA13a8defcc3d9436d24846ee0a8b8fca6f5fbbde0b
SHA256d404e019dc8397825104ba5236479bbd90dc49ca5db8c0ca639a4a3c798bdd01
SHA512918b148f0b4ce13ec001804d9de2dd7c6d35f15cb47cb8cdc2853073369c83d791987eed772a48b26985783160fbabfe0ff0ea56ee4b325de207391f9ec42ad8
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
1.2MB
MD56ae792455fdcb6c7757f1af6f5ffc258
SHA10c05017655457cbf4eac2e694c0f3da1a3313860
SHA2563dfd85f169f785f72ef598551f8da90be6fc0bd7e43cf18db010ca8a843ebc68
SHA512130f1e205f66e6db84cb52774797ac2b2d6789552785faf1917cc99ee9736f129a4b555d63b50c7859ba37661a11a8d0c80a92771e3cb25dd599010738e8e136
-
Filesize
1.2MB
MD56ae792455fdcb6c7757f1af6f5ffc258
SHA10c05017655457cbf4eac2e694c0f3da1a3313860
SHA2563dfd85f169f785f72ef598551f8da90be6fc0bd7e43cf18db010ca8a843ebc68
SHA512130f1e205f66e6db84cb52774797ac2b2d6789552785faf1917cc99ee9736f129a4b555d63b50c7859ba37661a11a8d0c80a92771e3cb25dd599010738e8e136
-
Filesize
1.2MB
MD56ae792455fdcb6c7757f1af6f5ffc258
SHA10c05017655457cbf4eac2e694c0f3da1a3313860
SHA2563dfd85f169f785f72ef598551f8da90be6fc0bd7e43cf18db010ca8a843ebc68
SHA512130f1e205f66e6db84cb52774797ac2b2d6789552785faf1917cc99ee9736f129a4b555d63b50c7859ba37661a11a8d0c80a92771e3cb25dd599010738e8e136
-
Filesize
7.0MB
MD5dfdb092fd460c1d4e5c5853bccdd08ca
SHA1766f11d4b12ae5f196b76581ed6a8930caa609ce
SHA2565cb22ccee1a8b75c76ff734ade511c73be1bb0e2f81fb463ccd85058c9bf028f
SHA5126e82fa11b7d547f5228c0441ee847113f581508ae367d7345b304fe3877be255c16ab16dd66bb0c42ae64173d613b36dbbda419b35fea0587e5c34f76aed012e
-
Filesize
7.0MB
MD5dfdb092fd460c1d4e5c5853bccdd08ca
SHA1766f11d4b12ae5f196b76581ed6a8930caa609ce
SHA2565cb22ccee1a8b75c76ff734ade511c73be1bb0e2f81fb463ccd85058c9bf028f
SHA5126e82fa11b7d547f5228c0441ee847113f581508ae367d7345b304fe3877be255c16ab16dd66bb0c42ae64173d613b36dbbda419b35fea0587e5c34f76aed012e
-
Filesize
7.0MB
MD5dfdb092fd460c1d4e5c5853bccdd08ca
SHA1766f11d4b12ae5f196b76581ed6a8930caa609ce
SHA2565cb22ccee1a8b75c76ff734ade511c73be1bb0e2f81fb463ccd85058c9bf028f
SHA5126e82fa11b7d547f5228c0441ee847113f581508ae367d7345b304fe3877be255c16ab16dd66bb0c42ae64173d613b36dbbda419b35fea0587e5c34f76aed012e
-
Filesize
3.0MB
MD502208e4168793ef72942aa31c1ae8642
SHA1449b579d0b642ca43419c0687cc799afe5aa9194
SHA25622b198c5fc1e073ef00fc7a44ca20db5f44630f4e0e746abcf2060207d7129d9
SHA512f50be51f1ff3da3da34d4c819021686842d024476993031e56313fde1aded427e9e81d0cb2956c98d29839fac140597a8e1b1cbd89a58c481be70ce88ce5507f
-
Filesize
3.0MB
MD502208e4168793ef72942aa31c1ae8642
SHA1449b579d0b642ca43419c0687cc799afe5aa9194
SHA25622b198c5fc1e073ef00fc7a44ca20db5f44630f4e0e746abcf2060207d7129d9
SHA512f50be51f1ff3da3da34d4c819021686842d024476993031e56313fde1aded427e9e81d0cb2956c98d29839fac140597a8e1b1cbd89a58c481be70ce88ce5507f
-
Filesize
3.0MB
MD502208e4168793ef72942aa31c1ae8642
SHA1449b579d0b642ca43419c0687cc799afe5aa9194
SHA25622b198c5fc1e073ef00fc7a44ca20db5f44630f4e0e746abcf2060207d7129d9
SHA512f50be51f1ff3da3da34d4c819021686842d024476993031e56313fde1aded427e9e81d0cb2956c98d29839fac140597a8e1b1cbd89a58c481be70ce88ce5507f
-
Filesize
80KB
MD549abb94406b24e7ae5fbcb9c7a4488a1
SHA1006f5dcbf7d3baf8c8b6aa811de5a8ee4e7ff006
SHA256c7250c7a5a5b1c5493a5d3e2be2127fdde5715f3fd3ca554658b7e392a357159
SHA512957b4b4ae7e1dcc0907de867dacd027adfd5fb233a8ff02a867db814eb64b387a48e20baed73eeb75d3d5b03fc414a87346f4a2342c36f0183edaa47f9bd7bf6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.0MB
MD5229df5fd5f850d26bb0b0a05f0918e9a
SHA1400871984e6d833956f06734d7be5d8b7c8cb997
SHA2564b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
SHA5121d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
Filesize
4.0MB
MD5229df5fd5f850d26bb0b0a05f0918e9a
SHA1400871984e6d833956f06734d7be5d8b7c8cb997
SHA2564b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
SHA5121d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
Filesize
4.0MB
MD5229df5fd5f850d26bb0b0a05f0918e9a
SHA1400871984e6d833956f06734d7be5d8b7c8cb997
SHA2564b9d1edaea936f67387f42846014802d768ee548af10116d09c2ae253a61cdbd
SHA5121d1f829572daa2a90311f3db455970043a95928c10bad066b51af2aef24d1e72fbe45cbecb61d682414c0d511d104af93826f594f627474c7dd1d142bd306756
-
Filesize
51.0MB
MD5c8e4b1b0b8cae39dda48eea75c46c54a
SHA14048bb13df36d5c68270602bc135a3944947d293
SHA2562da8c8f15ecf0de47bbcf4637aabb23cf4272cddefe0a1cbbdab1404ce782301
SHA512df2701d8385ec8a86abdfc55ccc4c6ee8c7dd44cc84955a46fd34f2b4b9b2e9d04fe95ced3659110dfdb34fde11633cfbbff4b7d7bb8bcbdc902ab384cb2ce26
-
Filesize
47.9MB
MD5a8f01352fe0228477fb395ec3e6abe72
SHA136e54d6ee95ae5bfcc19bdeb1c85c7ed1abef093
SHA256ec18f23b9d741812e9ccaa4541fa8fe2b4bbb8c1e8bc4dfe7d6efa4fd4cd4118
SHA5121ad4fc3bc43b6e574d469a1a88f11e5af08d5aa2cb6c369e5d39b1d0a6c8b10a2e080d62e313f1a661c9caa4efcfc9edf6bea08b1ee34ffb470846264a8dea6d