Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2023 19:26
Static task
static1
Behavioral task
behavioral1
Sample
b8401bf0ab39781024ba5a52ac62250aca3c4791687c28fca9d51a6cd76900c0.exe
Resource
win10v2004-20230824-en
General
-
Target
b8401bf0ab39781024ba5a52ac62250aca3c4791687c28fca9d51a6cd76900c0.exe
-
Size
702KB
-
MD5
f93567a7ebf798787fad600bdb37fd25
-
SHA1
2658309bb0e594a525f1c9142ccf11de2fabb334
-
SHA256
b8401bf0ab39781024ba5a52ac62250aca3c4791687c28fca9d51a6cd76900c0
-
SHA512
76e7a80322da0c11589b9346ac2a8fd1e84414eb2b02244a6c01771bd0a93ed21a82619617524ef4562e640996907a0c4f19912e01ebfc91e4c8670d7df3dd0a
-
SSDEEP
12288:gMrty90+bjdGh/X0ddkb5jbVgOlx2EwQCcQrza7q+hlqp8M:9y3bjdQ/c6bpVgOGBlcQK7q+hkpv
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
jaja
77.91.124.73:19071
-
auth_value
3670179d176ca399ed08e7914610b43c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023014-26.dat healer behavioral1/files/0x0007000000023014-27.dat healer behavioral1/memory/3904-28-0x0000000000110000-0x000000000011A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g5128932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g5128932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g5128932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g5128932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g5128932.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g5128932.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 3708 x6010460.exe 2236 x0743981.exe 556 x8355121.exe 3904 g5128932.exe 3892 h4918357.exe 4828 saves.exe 1612 i4342314.exe 3788 saves.exe 1828 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4276 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g5128932.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b8401bf0ab39781024ba5a52ac62250aca3c4791687c28fca9d51a6cd76900c0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6010460.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0743981.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8355121.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4600 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3904 g5128932.exe 3904 g5128932.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3904 g5128932.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 212 wrote to memory of 3708 212 b8401bf0ab39781024ba5a52ac62250aca3c4791687c28fca9d51a6cd76900c0.exe 86 PID 212 wrote to memory of 3708 212 b8401bf0ab39781024ba5a52ac62250aca3c4791687c28fca9d51a6cd76900c0.exe 86 PID 212 wrote to memory of 3708 212 b8401bf0ab39781024ba5a52ac62250aca3c4791687c28fca9d51a6cd76900c0.exe 86 PID 3708 wrote to memory of 2236 3708 x6010460.exe 87 PID 3708 wrote to memory of 2236 3708 x6010460.exe 87 PID 3708 wrote to memory of 2236 3708 x6010460.exe 87 PID 2236 wrote to memory of 556 2236 x0743981.exe 88 PID 2236 wrote to memory of 556 2236 x0743981.exe 88 PID 2236 wrote to memory of 556 2236 x0743981.exe 88 PID 556 wrote to memory of 3904 556 x8355121.exe 89 PID 556 wrote to memory of 3904 556 x8355121.exe 89 PID 556 wrote to memory of 3892 556 x8355121.exe 91 PID 556 wrote to memory of 3892 556 x8355121.exe 91 PID 556 wrote to memory of 3892 556 x8355121.exe 91 PID 3892 wrote to memory of 4828 3892 h4918357.exe 92 PID 3892 wrote to memory of 4828 3892 h4918357.exe 92 PID 3892 wrote to memory of 4828 3892 h4918357.exe 92 PID 2236 wrote to memory of 1612 2236 x0743981.exe 93 PID 2236 wrote to memory of 1612 2236 x0743981.exe 93 PID 2236 wrote to memory of 1612 2236 x0743981.exe 93 PID 4828 wrote to memory of 4600 4828 saves.exe 94 PID 4828 wrote to memory of 4600 4828 saves.exe 94 PID 4828 wrote to memory of 4600 4828 saves.exe 94 PID 4828 wrote to memory of 3968 4828 saves.exe 96 PID 4828 wrote to memory of 3968 4828 saves.exe 96 PID 4828 wrote to memory of 3968 4828 saves.exe 96 PID 3968 wrote to memory of 3244 3968 cmd.exe 98 PID 3968 wrote to memory of 3244 3968 cmd.exe 98 PID 3968 wrote to memory of 3244 3968 cmd.exe 98 PID 3968 wrote to memory of 4400 3968 cmd.exe 99 PID 3968 wrote to memory of 4400 3968 cmd.exe 99 PID 3968 wrote to memory of 4400 3968 cmd.exe 99 PID 3968 wrote to memory of 796 3968 cmd.exe 100 PID 3968 wrote to memory of 796 3968 cmd.exe 100 PID 3968 wrote to memory of 796 3968 cmd.exe 100 PID 3968 wrote to memory of 2676 3968 cmd.exe 101 PID 3968 wrote to memory of 2676 3968 cmd.exe 101 PID 3968 wrote to memory of 2676 3968 cmd.exe 101 PID 3968 wrote to memory of 1076 3968 cmd.exe 102 PID 3968 wrote to memory of 1076 3968 cmd.exe 102 PID 3968 wrote to memory of 1076 3968 cmd.exe 102 PID 3968 wrote to memory of 4956 3968 cmd.exe 103 PID 3968 wrote to memory of 4956 3968 cmd.exe 103 PID 3968 wrote to memory of 4956 3968 cmd.exe 103 PID 4828 wrote to memory of 4276 4828 saves.exe 107 PID 4828 wrote to memory of 4276 4828 saves.exe 107 PID 4828 wrote to memory of 4276 4828 saves.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8401bf0ab39781024ba5a52ac62250aca3c4791687c28fca9d51a6cd76900c0.exe"C:\Users\Admin\AppData\Local\Temp\b8401bf0ab39781024ba5a52ac62250aca3c4791687c28fca9d51a6cd76900c0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6010460.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6010460.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0743981.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0743981.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8355121.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8355121.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5128932.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5128932.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3904
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4918357.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4918357.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4600
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3244
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4400
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:1076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:4956
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4276
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4342314.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4342314.exe4⤵
- Executes dropped EXE
PID:1612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3788
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1828
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD54b0569f7daf9663b67a26d2315890b38
SHA172a956179ce187827726ebbdbd80162bd7c79c31
SHA25692a71bb10b5e28370410db54573bcbf80dd4751015de870f9c4127800947d33b
SHA5128059ddb6a76f6dd9197a96f5695de6be7996023f98c9f8232d3fd2cb8b179483edc8de9a2358ba10e0e428de107487e0bc71bd12d1dd5fd53c2809b1ac9b3ac8
-
Filesize
599KB
MD54b0569f7daf9663b67a26d2315890b38
SHA172a956179ce187827726ebbdbd80162bd7c79c31
SHA25692a71bb10b5e28370410db54573bcbf80dd4751015de870f9c4127800947d33b
SHA5128059ddb6a76f6dd9197a96f5695de6be7996023f98c9f8232d3fd2cb8b179483edc8de9a2358ba10e0e428de107487e0bc71bd12d1dd5fd53c2809b1ac9b3ac8
-
Filesize
433KB
MD5d5af5eb76b5d847081658ad91432db44
SHA1b38f647f2a79d1522f05944c9448bb27c8041c04
SHA256d37bb2a8b403334a42c02b2068979a6124c7581e0a4d6c7334266b7ffc6fbe22
SHA512bf8cac71b203a084b9d825a1c4b9d08fea531bedf29a9104d24dbc8247a2e98a7b2b404fea34f7ab3ddeb50e1e77590ad37d4228770af27c8b093ea4c70232ef
-
Filesize
433KB
MD5d5af5eb76b5d847081658ad91432db44
SHA1b38f647f2a79d1522f05944c9448bb27c8041c04
SHA256d37bb2a8b403334a42c02b2068979a6124c7581e0a4d6c7334266b7ffc6fbe22
SHA512bf8cac71b203a084b9d825a1c4b9d08fea531bedf29a9104d24dbc8247a2e98a7b2b404fea34f7ab3ddeb50e1e77590ad37d4228770af27c8b093ea4c70232ef
-
Filesize
175KB
MD533575167c3363e00a710851baae28221
SHA198c46f590068fc922ecc31fe8f30bb0e26917337
SHA25672e900a3d2e2feb65936a88112e38ad93f126a5dd0b99cb05fa9b49f50818de2
SHA5123521f6619a787abfd0b4cc16d7780bea84e5155343893ed40c43c7d83ae843f43bb69f3d77e84b9b522b259bbe93c25f651266bfb50c7ac922f139ca09fe4ad9
-
Filesize
175KB
MD533575167c3363e00a710851baae28221
SHA198c46f590068fc922ecc31fe8f30bb0e26917337
SHA25672e900a3d2e2feb65936a88112e38ad93f126a5dd0b99cb05fa9b49f50818de2
SHA5123521f6619a787abfd0b4cc16d7780bea84e5155343893ed40c43c7d83ae843f43bb69f3d77e84b9b522b259bbe93c25f651266bfb50c7ac922f139ca09fe4ad9
-
Filesize
277KB
MD5801591aa400c3824fd425b28fd1eff72
SHA1c54c509191146017808659bcbf46cb4769f57690
SHA2560083ae4f3c264f6b69892930f9a2e9937dd7fc5a0461991b685df8beaba8878d
SHA5124311b15eb93ccb2af22cf9bc8d4199700a2dcd2c6dd0ddbee0f51ad765893dcb197bed238d9053f77b60d6e1348be4e93da3740462e89b4dff86b12716b37914
-
Filesize
277KB
MD5801591aa400c3824fd425b28fd1eff72
SHA1c54c509191146017808659bcbf46cb4769f57690
SHA2560083ae4f3c264f6b69892930f9a2e9937dd7fc5a0461991b685df8beaba8878d
SHA5124311b15eb93ccb2af22cf9bc8d4199700a2dcd2c6dd0ddbee0f51ad765893dcb197bed238d9053f77b60d6e1348be4e93da3740462e89b4dff86b12716b37914
-
Filesize
14KB
MD5f854b8284c0b9de069e2d3c89d8f5fa3
SHA1a788828ff7433444ded7c7fcbf05f89d1bb1c3f0
SHA256b4daaee978fccb7c0fa8bed708954f2684ecc4f2971c82fe4fe54f7478aa20ca
SHA5121b108c478586ba0d8925a4577fdf256cc7ca1ca48d31394e66fe37539ae210bd110b4fef3f2d2c548669a06224b302ac40fb7b31a805d925c8b4a0e0d3aa37c3
-
Filesize
14KB
MD5f854b8284c0b9de069e2d3c89d8f5fa3
SHA1a788828ff7433444ded7c7fcbf05f89d1bb1c3f0
SHA256b4daaee978fccb7c0fa8bed708954f2684ecc4f2971c82fe4fe54f7478aa20ca
SHA5121b108c478586ba0d8925a4577fdf256cc7ca1ca48d31394e66fe37539ae210bd110b4fef3f2d2c548669a06224b302ac40fb7b31a805d925c8b4a0e0d3aa37c3
-
Filesize
321KB
MD57a3db1f109136eaff6da0903b82c7722
SHA1729db0a06c890409a6920e895d31465bd9ca2496
SHA256f658a44575eb095214ba50e94ea56d2a30fcccbba28fcbfa42be3605a2bc08f4
SHA512cdda890b261554bcfa183dfe6b7b61dd6f5ea77314691ed27245286efa0ee9a34082cf1e6e3ec004bcf13481a77dbe24bda584f304784a9d38d33c2f2ca3dfdf
-
Filesize
321KB
MD57a3db1f109136eaff6da0903b82c7722
SHA1729db0a06c890409a6920e895d31465bd9ca2496
SHA256f658a44575eb095214ba50e94ea56d2a30fcccbba28fcbfa42be3605a2bc08f4
SHA512cdda890b261554bcfa183dfe6b7b61dd6f5ea77314691ed27245286efa0ee9a34082cf1e6e3ec004bcf13481a77dbe24bda584f304784a9d38d33c2f2ca3dfdf
-
Filesize
321KB
MD57a3db1f109136eaff6da0903b82c7722
SHA1729db0a06c890409a6920e895d31465bd9ca2496
SHA256f658a44575eb095214ba50e94ea56d2a30fcccbba28fcbfa42be3605a2bc08f4
SHA512cdda890b261554bcfa183dfe6b7b61dd6f5ea77314691ed27245286efa0ee9a34082cf1e6e3ec004bcf13481a77dbe24bda584f304784a9d38d33c2f2ca3dfdf
-
Filesize
321KB
MD57a3db1f109136eaff6da0903b82c7722
SHA1729db0a06c890409a6920e895d31465bd9ca2496
SHA256f658a44575eb095214ba50e94ea56d2a30fcccbba28fcbfa42be3605a2bc08f4
SHA512cdda890b261554bcfa183dfe6b7b61dd6f5ea77314691ed27245286efa0ee9a34082cf1e6e3ec004bcf13481a77dbe24bda584f304784a9d38d33c2f2ca3dfdf
-
Filesize
321KB
MD57a3db1f109136eaff6da0903b82c7722
SHA1729db0a06c890409a6920e895d31465bd9ca2496
SHA256f658a44575eb095214ba50e94ea56d2a30fcccbba28fcbfa42be3605a2bc08f4
SHA512cdda890b261554bcfa183dfe6b7b61dd6f5ea77314691ed27245286efa0ee9a34082cf1e6e3ec004bcf13481a77dbe24bda584f304784a9d38d33c2f2ca3dfdf
-
Filesize
321KB
MD57a3db1f109136eaff6da0903b82c7722
SHA1729db0a06c890409a6920e895d31465bd9ca2496
SHA256f658a44575eb095214ba50e94ea56d2a30fcccbba28fcbfa42be3605a2bc08f4
SHA512cdda890b261554bcfa183dfe6b7b61dd6f5ea77314691ed27245286efa0ee9a34082cf1e6e3ec004bcf13481a77dbe24bda584f304784a9d38d33c2f2ca3dfdf
-
Filesize
321KB
MD57a3db1f109136eaff6da0903b82c7722
SHA1729db0a06c890409a6920e895d31465bd9ca2496
SHA256f658a44575eb095214ba50e94ea56d2a30fcccbba28fcbfa42be3605a2bc08f4
SHA512cdda890b261554bcfa183dfe6b7b61dd6f5ea77314691ed27245286efa0ee9a34082cf1e6e3ec004bcf13481a77dbe24bda584f304784a9d38d33c2f2ca3dfdf
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7