Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2023 13:13
Static task
static1
Behavioral task
behavioral1
Sample
77eb2d8b313d60360740b634a8c0ad30710c355b4f59483bfa2fd1d08e9c0e6d.exe
Resource
win10v2004-20230703-en
General
-
Target
77eb2d8b313d60360740b634a8c0ad30710c355b4f59483bfa2fd1d08e9c0e6d.exe
-
Size
704KB
-
MD5
43ec5348932787e2adb9b746a1dcf028
-
SHA1
34ad976c0abfc8eb928ee6f7021606f2987644bf
-
SHA256
77eb2d8b313d60360740b634a8c0ad30710c355b4f59483bfa2fd1d08e9c0e6d
-
SHA512
e1784d65cff150b64f9971cbfbabedf9fd471b5e15cda6affa8f4d279d7013ddfbcdcabfb90d3bae72ad06537d003ff0c4439f84d21642e667e42e19a9fab9da
-
SSDEEP
12288:gMr/y90GSMMGho9CIkfCFePJcZQ6fynlQkCX4WE6oWTY0YbyspFMk2zeuKF:vyB9MQP6FeaZ1qakD6oJusok269
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
rwan
77.91.124.73:19071
-
auth_value
7c40eda5da4f888d6f61befbf947d9fe
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000800000002328d-26.dat healer behavioral1/files/0x000800000002328d-27.dat healer behavioral1/memory/3732-28-0x0000000000330000-0x000000000033A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g5786446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g5786446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g5786446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g5786446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g5786446.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g5786446.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 1448 x6366946.exe 4244 x2391672.exe 4112 x2243806.exe 3732 g5786446.exe 1524 h3934089.exe 3744 saves.exe 404 i0168935.exe 4116 saves.exe 2876 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3044 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g5786446.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 77eb2d8b313d60360740b634a8c0ad30710c355b4f59483bfa2fd1d08e9c0e6d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6366946.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2391672.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2243806.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3732 g5786446.exe 3732 g5786446.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3732 g5786446.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1448 2024 77eb2d8b313d60360740b634a8c0ad30710c355b4f59483bfa2fd1d08e9c0e6d.exe 82 PID 2024 wrote to memory of 1448 2024 77eb2d8b313d60360740b634a8c0ad30710c355b4f59483bfa2fd1d08e9c0e6d.exe 82 PID 2024 wrote to memory of 1448 2024 77eb2d8b313d60360740b634a8c0ad30710c355b4f59483bfa2fd1d08e9c0e6d.exe 82 PID 1448 wrote to memory of 4244 1448 x6366946.exe 83 PID 1448 wrote to memory of 4244 1448 x6366946.exe 83 PID 1448 wrote to memory of 4244 1448 x6366946.exe 83 PID 4244 wrote to memory of 4112 4244 x2391672.exe 84 PID 4244 wrote to memory of 4112 4244 x2391672.exe 84 PID 4244 wrote to memory of 4112 4244 x2391672.exe 84 PID 4112 wrote to memory of 3732 4112 x2243806.exe 85 PID 4112 wrote to memory of 3732 4112 x2243806.exe 85 PID 4112 wrote to memory of 1524 4112 x2243806.exe 91 PID 4112 wrote to memory of 1524 4112 x2243806.exe 91 PID 4112 wrote to memory of 1524 4112 x2243806.exe 91 PID 1524 wrote to memory of 3744 1524 h3934089.exe 92 PID 1524 wrote to memory of 3744 1524 h3934089.exe 92 PID 1524 wrote to memory of 3744 1524 h3934089.exe 92 PID 4244 wrote to memory of 404 4244 x2391672.exe 93 PID 4244 wrote to memory of 404 4244 x2391672.exe 93 PID 4244 wrote to memory of 404 4244 x2391672.exe 93 PID 3744 wrote to memory of 4844 3744 saves.exe 94 PID 3744 wrote to memory of 4844 3744 saves.exe 94 PID 3744 wrote to memory of 4844 3744 saves.exe 94 PID 3744 wrote to memory of 4392 3744 saves.exe 96 PID 3744 wrote to memory of 4392 3744 saves.exe 96 PID 3744 wrote to memory of 4392 3744 saves.exe 96 PID 4392 wrote to memory of 5064 4392 cmd.exe 98 PID 4392 wrote to memory of 5064 4392 cmd.exe 98 PID 4392 wrote to memory of 5064 4392 cmd.exe 98 PID 4392 wrote to memory of 4036 4392 cmd.exe 99 PID 4392 wrote to memory of 4036 4392 cmd.exe 99 PID 4392 wrote to memory of 4036 4392 cmd.exe 99 PID 4392 wrote to memory of 3960 4392 cmd.exe 100 PID 4392 wrote to memory of 3960 4392 cmd.exe 100 PID 4392 wrote to memory of 3960 4392 cmd.exe 100 PID 4392 wrote to memory of 228 4392 cmd.exe 101 PID 4392 wrote to memory of 228 4392 cmd.exe 101 PID 4392 wrote to memory of 228 4392 cmd.exe 101 PID 4392 wrote to memory of 4868 4392 cmd.exe 102 PID 4392 wrote to memory of 4868 4392 cmd.exe 102 PID 4392 wrote to memory of 4868 4392 cmd.exe 102 PID 4392 wrote to memory of 3364 4392 cmd.exe 103 PID 4392 wrote to memory of 3364 4392 cmd.exe 103 PID 4392 wrote to memory of 3364 4392 cmd.exe 103 PID 3744 wrote to memory of 3044 3744 saves.exe 110 PID 3744 wrote to memory of 3044 3744 saves.exe 110 PID 3744 wrote to memory of 3044 3744 saves.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\77eb2d8b313d60360740b634a8c0ad30710c355b4f59483bfa2fd1d08e9c0e6d.exe"C:\Users\Admin\AppData\Local\Temp\77eb2d8b313d60360740b634a8c0ad30710c355b4f59483bfa2fd1d08e9c0e6d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6366946.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6366946.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2391672.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2391672.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2243806.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2243806.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5786446.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5786446.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3934089.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3934089.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4844
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:5064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4036
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:3960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:228
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4868
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:3364
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3044
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0168935.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0168935.exe4⤵
- Executes dropped EXE
PID:404
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4116
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2876
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5e8ec8bb7e8b55c93bb20e1809e949701
SHA1da600cb2a2d864de8afae3d5b2d38c3b3a570292
SHA25661b2459de17782328fc15ef2f0558eeee2c270a1c31b98b70c05e2510f930eec
SHA512cab21163568dd379013b579e8d7ddf9239b73dddd6647a541a6f2aa7a312b033b679417e3ee5f4feb82858674168c68be0c519000a589a4afcec3655ca1872a1
-
Filesize
599KB
MD5e8ec8bb7e8b55c93bb20e1809e949701
SHA1da600cb2a2d864de8afae3d5b2d38c3b3a570292
SHA25661b2459de17782328fc15ef2f0558eeee2c270a1c31b98b70c05e2510f930eec
SHA512cab21163568dd379013b579e8d7ddf9239b73dddd6647a541a6f2aa7a312b033b679417e3ee5f4feb82858674168c68be0c519000a589a4afcec3655ca1872a1
-
Filesize
433KB
MD5c3b163116beaaf70e293dfeeaa55fe25
SHA1a05b1efe055aa8e3defbb6c4e4748a65772a6890
SHA2560681a3e997f5cc8a4e01b2a2de492ba0ee63c13b9ead14344e2ec0ef57d76e04
SHA512bb4901b9460f8853f86207d3d234920134cd6ba023ee5b6248bfac2a8d9b7194baab7dddfd81006f311848a0b0cd00840a2f90e45fc14d19ea66268266065462
-
Filesize
433KB
MD5c3b163116beaaf70e293dfeeaa55fe25
SHA1a05b1efe055aa8e3defbb6c4e4748a65772a6890
SHA2560681a3e997f5cc8a4e01b2a2de492ba0ee63c13b9ead14344e2ec0ef57d76e04
SHA512bb4901b9460f8853f86207d3d234920134cd6ba023ee5b6248bfac2a8d9b7194baab7dddfd81006f311848a0b0cd00840a2f90e45fc14d19ea66268266065462
-
Filesize
174KB
MD527d2e6204f1ea529884bdeb19a797f66
SHA167ad291baaa686891c18a023e83768fb9b7a65cf
SHA256067ff99e9772a56441c2ad22ef5a7855127d771d305de0bd12645df165402b55
SHA512491d74c80446ef61a5fd1a0de2135846e766086ecb4be8831183ba3e5e92bbf4d8affa8e1e3183a616e0b079d60557dd055dbad87df412a00d741c31551e4fa8
-
Filesize
174KB
MD527d2e6204f1ea529884bdeb19a797f66
SHA167ad291baaa686891c18a023e83768fb9b7a65cf
SHA256067ff99e9772a56441c2ad22ef5a7855127d771d305de0bd12645df165402b55
SHA512491d74c80446ef61a5fd1a0de2135846e766086ecb4be8831183ba3e5e92bbf4d8affa8e1e3183a616e0b079d60557dd055dbad87df412a00d741c31551e4fa8
-
Filesize
277KB
MD5ae0e8d4ffb3981062f546ed6907da1f5
SHA17d35634bfb370c03c5b60230aa83a455acb6d4ee
SHA2562ca4bd6f253b70d44d15214082e668600cca1fd06e5229f87457cc9fab608a98
SHA51208554669192e51f9257d3f07155d28aa07bf0c14d6d45037c503b48864830b3f0cc2dd61c6b335e64a2236648e38d84d408ca360cd67fca4b304a21063d85da7
-
Filesize
277KB
MD5ae0e8d4ffb3981062f546ed6907da1f5
SHA17d35634bfb370c03c5b60230aa83a455acb6d4ee
SHA2562ca4bd6f253b70d44d15214082e668600cca1fd06e5229f87457cc9fab608a98
SHA51208554669192e51f9257d3f07155d28aa07bf0c14d6d45037c503b48864830b3f0cc2dd61c6b335e64a2236648e38d84d408ca360cd67fca4b304a21063d85da7
-
Filesize
13KB
MD54d61e7078749bcf485325570a2246379
SHA1acbb9775adc299b69246ea215bb6ad6ae2014a58
SHA2569e5402c74350b7001f45d481366940aa2cbcb014e2572a27c38c6df0a698b961
SHA5123dd7a02aab7722a44dcb01851b78a0e642749bfd4346d76ca9f34ad44abdae185ad099b72d3373a061b21739072620e6f65dd52b31794bd167cb7c4e8e651a62
-
Filesize
13KB
MD54d61e7078749bcf485325570a2246379
SHA1acbb9775adc299b69246ea215bb6ad6ae2014a58
SHA2569e5402c74350b7001f45d481366940aa2cbcb014e2572a27c38c6df0a698b961
SHA5123dd7a02aab7722a44dcb01851b78a0e642749bfd4346d76ca9f34ad44abdae185ad099b72d3373a061b21739072620e6f65dd52b31794bd167cb7c4e8e651a62
-
Filesize
318KB
MD55ab6c58a749c9c0cf031be33b73e1b33
SHA1f4a64ccb8729c5debd0a38a8122ebfb76b70767b
SHA25681287ed034f95f196a36bdc81391e9027b6226832927d38a3b2d81029ed40f01
SHA512b1d37a47f44f5e3a48f70708a68146734e98f9947fd6060d643500ec6fddbc7e4045236d7a1e9cb38d4c96406d363da007eec9a3167da0188ad1cb4e2b1c889d
-
Filesize
318KB
MD55ab6c58a749c9c0cf031be33b73e1b33
SHA1f4a64ccb8729c5debd0a38a8122ebfb76b70767b
SHA25681287ed034f95f196a36bdc81391e9027b6226832927d38a3b2d81029ed40f01
SHA512b1d37a47f44f5e3a48f70708a68146734e98f9947fd6060d643500ec6fddbc7e4045236d7a1e9cb38d4c96406d363da007eec9a3167da0188ad1cb4e2b1c889d
-
Filesize
318KB
MD55ab6c58a749c9c0cf031be33b73e1b33
SHA1f4a64ccb8729c5debd0a38a8122ebfb76b70767b
SHA25681287ed034f95f196a36bdc81391e9027b6226832927d38a3b2d81029ed40f01
SHA512b1d37a47f44f5e3a48f70708a68146734e98f9947fd6060d643500ec6fddbc7e4045236d7a1e9cb38d4c96406d363da007eec9a3167da0188ad1cb4e2b1c889d
-
Filesize
318KB
MD55ab6c58a749c9c0cf031be33b73e1b33
SHA1f4a64ccb8729c5debd0a38a8122ebfb76b70767b
SHA25681287ed034f95f196a36bdc81391e9027b6226832927d38a3b2d81029ed40f01
SHA512b1d37a47f44f5e3a48f70708a68146734e98f9947fd6060d643500ec6fddbc7e4045236d7a1e9cb38d4c96406d363da007eec9a3167da0188ad1cb4e2b1c889d
-
Filesize
318KB
MD55ab6c58a749c9c0cf031be33b73e1b33
SHA1f4a64ccb8729c5debd0a38a8122ebfb76b70767b
SHA25681287ed034f95f196a36bdc81391e9027b6226832927d38a3b2d81029ed40f01
SHA512b1d37a47f44f5e3a48f70708a68146734e98f9947fd6060d643500ec6fddbc7e4045236d7a1e9cb38d4c96406d363da007eec9a3167da0188ad1cb4e2b1c889d
-
Filesize
318KB
MD55ab6c58a749c9c0cf031be33b73e1b33
SHA1f4a64ccb8729c5debd0a38a8122ebfb76b70767b
SHA25681287ed034f95f196a36bdc81391e9027b6226832927d38a3b2d81029ed40f01
SHA512b1d37a47f44f5e3a48f70708a68146734e98f9947fd6060d643500ec6fddbc7e4045236d7a1e9cb38d4c96406d363da007eec9a3167da0188ad1cb4e2b1c889d
-
Filesize
318KB
MD55ab6c58a749c9c0cf031be33b73e1b33
SHA1f4a64ccb8729c5debd0a38a8122ebfb76b70767b
SHA25681287ed034f95f196a36bdc81391e9027b6226832927d38a3b2d81029ed40f01
SHA512b1d37a47f44f5e3a48f70708a68146734e98f9947fd6060d643500ec6fddbc7e4045236d7a1e9cb38d4c96406d363da007eec9a3167da0188ad1cb4e2b1c889d
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7