Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
26/08/2023, 20:16
Static task
static1
Behavioral task
behavioral1
Sample
0102b97ccd8e059258f969c908b2b5ad8bc6eb274a03f38599b2e0d72444174f.exe
Resource
win10-20230703-en
General
-
Target
0102b97ccd8e059258f969c908b2b5ad8bc6eb274a03f38599b2e0d72444174f.exe
-
Size
705KB
-
MD5
32505df5c436762d8419cc99b5dc87c3
-
SHA1
dcbb5a5e1a7257197e6f6dc16cc27fcb1d2a5387
-
SHA256
0102b97ccd8e059258f969c908b2b5ad8bc6eb274a03f38599b2e0d72444174f
-
SHA512
829cad0ea95caee5aabcfa87f2d245cbe84afa0cdbe4ef5843ace91f1a1ee0d42da0364a6d2a10c2300a01d081157491804a42fd07e6d9b4e5b6be7c9da64bf7
-
SSDEEP
12288:5Mr7y907six8LjD+no+YujT08D9cm48YBl9SiQDQHk+D+PKbAT9BKg:OyJiijMdYf8Km5Wl9WMBaPKb7g
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
jaja
77.91.124.73:19071
-
auth_value
3670179d176ca399ed08e7914610b43c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001af67-26.dat healer behavioral1/files/0x000700000001af67-27.dat healer behavioral1/memory/5056-28-0x0000000000990000-0x000000000099A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g8617631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g8617631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g8617631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g8617631.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g8617631.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 1380 x7362345.exe 5024 x1393033.exe 1008 x6291656.exe 5056 g8617631.exe 3720 h2331448.exe 2088 saves.exe 5108 i2660627.exe 700 saves.exe 4060 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 5112 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g8617631.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0102b97ccd8e059258f969c908b2b5ad8bc6eb274a03f38599b2e0d72444174f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7362345.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1393033.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x6291656.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1216 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5056 g8617631.exe 5056 g8617631.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5056 g8617631.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4112 wrote to memory of 1380 4112 0102b97ccd8e059258f969c908b2b5ad8bc6eb274a03f38599b2e0d72444174f.exe 69 PID 4112 wrote to memory of 1380 4112 0102b97ccd8e059258f969c908b2b5ad8bc6eb274a03f38599b2e0d72444174f.exe 69 PID 4112 wrote to memory of 1380 4112 0102b97ccd8e059258f969c908b2b5ad8bc6eb274a03f38599b2e0d72444174f.exe 69 PID 1380 wrote to memory of 5024 1380 x7362345.exe 70 PID 1380 wrote to memory of 5024 1380 x7362345.exe 70 PID 1380 wrote to memory of 5024 1380 x7362345.exe 70 PID 5024 wrote to memory of 1008 5024 x1393033.exe 71 PID 5024 wrote to memory of 1008 5024 x1393033.exe 71 PID 5024 wrote to memory of 1008 5024 x1393033.exe 71 PID 1008 wrote to memory of 5056 1008 x6291656.exe 72 PID 1008 wrote to memory of 5056 1008 x6291656.exe 72 PID 1008 wrote to memory of 3720 1008 x6291656.exe 73 PID 1008 wrote to memory of 3720 1008 x6291656.exe 73 PID 1008 wrote to memory of 3720 1008 x6291656.exe 73 PID 3720 wrote to memory of 2088 3720 h2331448.exe 74 PID 3720 wrote to memory of 2088 3720 h2331448.exe 74 PID 3720 wrote to memory of 2088 3720 h2331448.exe 74 PID 5024 wrote to memory of 5108 5024 x1393033.exe 75 PID 5024 wrote to memory of 5108 5024 x1393033.exe 75 PID 5024 wrote to memory of 5108 5024 x1393033.exe 75 PID 2088 wrote to memory of 1216 2088 saves.exe 76 PID 2088 wrote to memory of 1216 2088 saves.exe 76 PID 2088 wrote to memory of 1216 2088 saves.exe 76 PID 2088 wrote to memory of 4508 2088 saves.exe 78 PID 2088 wrote to memory of 4508 2088 saves.exe 78 PID 2088 wrote to memory of 4508 2088 saves.exe 78 PID 4508 wrote to memory of 2392 4508 cmd.exe 80 PID 4508 wrote to memory of 2392 4508 cmd.exe 80 PID 4508 wrote to memory of 2392 4508 cmd.exe 80 PID 4508 wrote to memory of 2040 4508 cmd.exe 81 PID 4508 wrote to memory of 2040 4508 cmd.exe 81 PID 4508 wrote to memory of 2040 4508 cmd.exe 81 PID 4508 wrote to memory of 2264 4508 cmd.exe 82 PID 4508 wrote to memory of 2264 4508 cmd.exe 82 PID 4508 wrote to memory of 2264 4508 cmd.exe 82 PID 4508 wrote to memory of 2072 4508 cmd.exe 83 PID 4508 wrote to memory of 2072 4508 cmd.exe 83 PID 4508 wrote to memory of 2072 4508 cmd.exe 83 PID 4508 wrote to memory of 3788 4508 cmd.exe 84 PID 4508 wrote to memory of 3788 4508 cmd.exe 84 PID 4508 wrote to memory of 3788 4508 cmd.exe 84 PID 4508 wrote to memory of 1004 4508 cmd.exe 85 PID 4508 wrote to memory of 1004 4508 cmd.exe 85 PID 4508 wrote to memory of 1004 4508 cmd.exe 85 PID 2088 wrote to memory of 5112 2088 saves.exe 87 PID 2088 wrote to memory of 5112 2088 saves.exe 87 PID 2088 wrote to memory of 5112 2088 saves.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0102b97ccd8e059258f969c908b2b5ad8bc6eb274a03f38599b2e0d72444174f.exe"C:\Users\Admin\AppData\Local\Temp\0102b97ccd8e059258f969c908b2b5ad8bc6eb274a03f38599b2e0d72444174f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7362345.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7362345.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1393033.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1393033.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6291656.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6291656.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8617631.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8617631.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2331448.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h2331448.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1216
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2392
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2040
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2072
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3788
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:1004
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:5112
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2660627.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i2660627.exe4⤵
- Executes dropped EXE
PID:5108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:700
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4060
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5ea7cb3eb9dbd6d2f1992359ed08bd397
SHA12d533e2e0a8bdd6cd821124261edc982176d5904
SHA2566739bb3f9e97b9bc98d9ab12d6b993ec84ecbfb16a48f2200e9365a17e5ba0fc
SHA5126650852ee8698426162c0760f785d385a85f845ddecf4f51624008bc0e54f200e3760cc2cba5b2b8d5b1adc84c89bacf9a337620122a27427376adbf2973776a
-
Filesize
599KB
MD5ea7cb3eb9dbd6d2f1992359ed08bd397
SHA12d533e2e0a8bdd6cd821124261edc982176d5904
SHA2566739bb3f9e97b9bc98d9ab12d6b993ec84ecbfb16a48f2200e9365a17e5ba0fc
SHA5126650852ee8698426162c0760f785d385a85f845ddecf4f51624008bc0e54f200e3760cc2cba5b2b8d5b1adc84c89bacf9a337620122a27427376adbf2973776a
-
Filesize
432KB
MD599f13ebc021d0c06d64f3446358c89d4
SHA112aab6b0a53efd09dde6d216fcb7897e861c1257
SHA2565b119f0dcff9d578cc18e6b450f6fedda68c4a715543e883e408d9572047eeb0
SHA5123f4843b67e8a4a0e35267fad1da498a94d7096b4b7792003b2bafd5afe90a23b17b4ea39c0a5fd289935583ed21b9f419513f3c33f44b3d783496b5e90480fa3
-
Filesize
432KB
MD599f13ebc021d0c06d64f3446358c89d4
SHA112aab6b0a53efd09dde6d216fcb7897e861c1257
SHA2565b119f0dcff9d578cc18e6b450f6fedda68c4a715543e883e408d9572047eeb0
SHA5123f4843b67e8a4a0e35267fad1da498a94d7096b4b7792003b2bafd5afe90a23b17b4ea39c0a5fd289935583ed21b9f419513f3c33f44b3d783496b5e90480fa3
-
Filesize
175KB
MD52bdd13712cf68663506028caef4bf1a8
SHA100700ee766d53277466eaa60e3ea71225291ec67
SHA256a78dedd3625131e5c40b0cde5f80b25fe1db256d063e53def5a8dcaa6f3349d7
SHA512ebe9b9a4992f3f86fc65bb210991ec48b9d979c44a276a6656b164c1831e256acb329e70a1fbddc146b37019311d7789d5a540b1ce4520452a98069955cf119c
-
Filesize
175KB
MD52bdd13712cf68663506028caef4bf1a8
SHA100700ee766d53277466eaa60e3ea71225291ec67
SHA256a78dedd3625131e5c40b0cde5f80b25fe1db256d063e53def5a8dcaa6f3349d7
SHA512ebe9b9a4992f3f86fc65bb210991ec48b9d979c44a276a6656b164c1831e256acb329e70a1fbddc146b37019311d7789d5a540b1ce4520452a98069955cf119c
-
Filesize
277KB
MD58d99ab64ff1901748662f9faed3afa61
SHA10f3727e7d647c6b0939a01750ac9f9e9ccf56cf1
SHA25622dc86559bcce4e2644219696afc7906ec22e91ad6387b27c63bcb0f727d29d4
SHA51252e1ef33f40a5a613175eaff2098d939eb49f5d9fdc1fd24d5c62d37a0d97ba58db255e7ede909b7786bd51f9d15c00f30afa98ed73d35f1f8f50e0fba3733ba
-
Filesize
277KB
MD58d99ab64ff1901748662f9faed3afa61
SHA10f3727e7d647c6b0939a01750ac9f9e9ccf56cf1
SHA25622dc86559bcce4e2644219696afc7906ec22e91ad6387b27c63bcb0f727d29d4
SHA51252e1ef33f40a5a613175eaff2098d939eb49f5d9fdc1fd24d5c62d37a0d97ba58db255e7ede909b7786bd51f9d15c00f30afa98ed73d35f1f8f50e0fba3733ba
-
Filesize
15KB
MD548c70eb127d5cde6865f001cc34b8247
SHA1af63ef45c6e4b898fbc6b1f204d3941190cb8373
SHA25698b503317cc836056dc5407979f619eb02803c663aaf9adfd87ae99122de189f
SHA5120dc685bc492b97f6c5ed6c2fa5d68700aa9f2751055d5728b3bdb97fa4369433f8a541775bc4996a8fa066667dd470228c7314ac227598de5c769355e0ad1f3e
-
Filesize
15KB
MD548c70eb127d5cde6865f001cc34b8247
SHA1af63ef45c6e4b898fbc6b1f204d3941190cb8373
SHA25698b503317cc836056dc5407979f619eb02803c663aaf9adfd87ae99122de189f
SHA5120dc685bc492b97f6c5ed6c2fa5d68700aa9f2751055d5728b3bdb97fa4369433f8a541775bc4996a8fa066667dd470228c7314ac227598de5c769355e0ad1f3e
-
Filesize
321KB
MD53e90dacc5a8ee406ba5ae03b302c56b5
SHA1dd206353eb25312430f5d8965aa4a51e13cdd9ca
SHA2568a33bc9f9f9424609a7c3f9b551bc1a8dafbf606a66a9ab11616ddafbb1b00e3
SHA51271e0e1a3986a15302da806126337e7918f51ab2da353cfa6b41b3ff9bf7351d8bc892dcc512904358d5587eb2d9e546d85157f31028911f04ac44f7db7c9032a
-
Filesize
321KB
MD53e90dacc5a8ee406ba5ae03b302c56b5
SHA1dd206353eb25312430f5d8965aa4a51e13cdd9ca
SHA2568a33bc9f9f9424609a7c3f9b551bc1a8dafbf606a66a9ab11616ddafbb1b00e3
SHA51271e0e1a3986a15302da806126337e7918f51ab2da353cfa6b41b3ff9bf7351d8bc892dcc512904358d5587eb2d9e546d85157f31028911f04ac44f7db7c9032a
-
Filesize
321KB
MD53e90dacc5a8ee406ba5ae03b302c56b5
SHA1dd206353eb25312430f5d8965aa4a51e13cdd9ca
SHA2568a33bc9f9f9424609a7c3f9b551bc1a8dafbf606a66a9ab11616ddafbb1b00e3
SHA51271e0e1a3986a15302da806126337e7918f51ab2da353cfa6b41b3ff9bf7351d8bc892dcc512904358d5587eb2d9e546d85157f31028911f04ac44f7db7c9032a
-
Filesize
321KB
MD53e90dacc5a8ee406ba5ae03b302c56b5
SHA1dd206353eb25312430f5d8965aa4a51e13cdd9ca
SHA2568a33bc9f9f9424609a7c3f9b551bc1a8dafbf606a66a9ab11616ddafbb1b00e3
SHA51271e0e1a3986a15302da806126337e7918f51ab2da353cfa6b41b3ff9bf7351d8bc892dcc512904358d5587eb2d9e546d85157f31028911f04ac44f7db7c9032a
-
Filesize
321KB
MD53e90dacc5a8ee406ba5ae03b302c56b5
SHA1dd206353eb25312430f5d8965aa4a51e13cdd9ca
SHA2568a33bc9f9f9424609a7c3f9b551bc1a8dafbf606a66a9ab11616ddafbb1b00e3
SHA51271e0e1a3986a15302da806126337e7918f51ab2da353cfa6b41b3ff9bf7351d8bc892dcc512904358d5587eb2d9e546d85157f31028911f04ac44f7db7c9032a
-
Filesize
321KB
MD53e90dacc5a8ee406ba5ae03b302c56b5
SHA1dd206353eb25312430f5d8965aa4a51e13cdd9ca
SHA2568a33bc9f9f9424609a7c3f9b551bc1a8dafbf606a66a9ab11616ddafbb1b00e3
SHA51271e0e1a3986a15302da806126337e7918f51ab2da353cfa6b41b3ff9bf7351d8bc892dcc512904358d5587eb2d9e546d85157f31028911f04ac44f7db7c9032a
-
Filesize
321KB
MD53e90dacc5a8ee406ba5ae03b302c56b5
SHA1dd206353eb25312430f5d8965aa4a51e13cdd9ca
SHA2568a33bc9f9f9424609a7c3f9b551bc1a8dafbf606a66a9ab11616ddafbb1b00e3
SHA51271e0e1a3986a15302da806126337e7918f51ab2da353cfa6b41b3ff9bf7351d8bc892dcc512904358d5587eb2d9e546d85157f31028911f04ac44f7db7c9032a
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b