Analysis
-
max time kernel
157s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
2d7744165c443a6900ed139eeaee80ecebaf4fd7205ad.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2d7744165c443a6900ed139eeaee80ecebaf4fd7205ad.exe
Resource
win10v2004-20230824-en
General
-
Target
2d7744165c443a6900ed139eeaee80ecebaf4fd7205ad.exe
-
Size
704KB
-
MD5
2cf78a30b057638a172722777cc197fd
-
SHA1
308402fa84f40ea18e4649cb0a1c32c2dd9e392e
-
SHA256
2d7744165c443a6900ed139eeaee80ecebaf4fd7205add48add186d8a7f5a375
-
SHA512
3762c8399df9c01c67fc71b81f969d64fc5686db131e7d5bf3f24512037df28b42b6a15b7f044aa25bf9200aa1886ae08014f14fd63bcb00b603b4d443ccd0e8
-
SSDEEP
12288:IMrzy90+h3XkjUch3lEXRWI+g9zEWV3lcKLxkWk9C3YxbKLeqaB68u:LyhanhKXkLg9BVVckxkWk9pxbKaNm
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x0008000000022fe3-26.dat healer behavioral2/files/0x0008000000022fe3-27.dat healer behavioral2/memory/3992-28-0x0000000000250000-0x000000000025A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g4254317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g4254317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g4254317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g4254317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g4254317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g4254317.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/files/0x0007000000022fe0-45.dat family_redline behavioral2/files/0x0007000000022fe0-46.dat family_redline behavioral2/memory/5064-47-0x0000000000960000-0x0000000000990000-memory.dmp family_redline -
Executes dropped EXE 9 IoCs
pid Process 4312 x3615523.exe 4848 x7116985.exe 4624 x2709437.exe 3992 g4254317.exe 3404 h0054376.exe 3188 saves.exe 5064 i7523209.exe 1688 saves.exe 1880 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 2400 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g4254317.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3615523.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7116985.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2709437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2d7744165c443a6900ed139eeaee80ecebaf4fd7205ad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4800 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3992 g4254317.exe 3992 g4254317.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3992 g4254317.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3152 wrote to memory of 4312 3152 2d7744165c443a6900ed139eeaee80ecebaf4fd7205ad.exe 88 PID 3152 wrote to memory of 4312 3152 2d7744165c443a6900ed139eeaee80ecebaf4fd7205ad.exe 88 PID 3152 wrote to memory of 4312 3152 2d7744165c443a6900ed139eeaee80ecebaf4fd7205ad.exe 88 PID 4312 wrote to memory of 4848 4312 x3615523.exe 89 PID 4312 wrote to memory of 4848 4312 x3615523.exe 89 PID 4312 wrote to memory of 4848 4312 x3615523.exe 89 PID 4848 wrote to memory of 4624 4848 x7116985.exe 90 PID 4848 wrote to memory of 4624 4848 x7116985.exe 90 PID 4848 wrote to memory of 4624 4848 x7116985.exe 90 PID 4624 wrote to memory of 3992 4624 x2709437.exe 91 PID 4624 wrote to memory of 3992 4624 x2709437.exe 91 PID 4624 wrote to memory of 3404 4624 x2709437.exe 92 PID 4624 wrote to memory of 3404 4624 x2709437.exe 92 PID 4624 wrote to memory of 3404 4624 x2709437.exe 92 PID 3404 wrote to memory of 3188 3404 h0054376.exe 93 PID 3404 wrote to memory of 3188 3404 h0054376.exe 93 PID 3404 wrote to memory of 3188 3404 h0054376.exe 93 PID 4848 wrote to memory of 5064 4848 x7116985.exe 94 PID 4848 wrote to memory of 5064 4848 x7116985.exe 94 PID 4848 wrote to memory of 5064 4848 x7116985.exe 94 PID 3188 wrote to memory of 4800 3188 saves.exe 96 PID 3188 wrote to memory of 4800 3188 saves.exe 96 PID 3188 wrote to memory of 4800 3188 saves.exe 96 PID 3188 wrote to memory of 404 3188 saves.exe 97 PID 3188 wrote to memory of 404 3188 saves.exe 97 PID 3188 wrote to memory of 404 3188 saves.exe 97 PID 404 wrote to memory of 2292 404 cmd.exe 99 PID 404 wrote to memory of 2292 404 cmd.exe 99 PID 404 wrote to memory of 2292 404 cmd.exe 99 PID 404 wrote to memory of 908 404 cmd.exe 100 PID 404 wrote to memory of 908 404 cmd.exe 100 PID 404 wrote to memory of 908 404 cmd.exe 100 PID 404 wrote to memory of 3240 404 cmd.exe 101 PID 404 wrote to memory of 3240 404 cmd.exe 101 PID 404 wrote to memory of 3240 404 cmd.exe 101 PID 404 wrote to memory of 2008 404 cmd.exe 103 PID 404 wrote to memory of 2008 404 cmd.exe 103 PID 404 wrote to memory of 2008 404 cmd.exe 103 PID 404 wrote to memory of 1392 404 cmd.exe 102 PID 404 wrote to memory of 1392 404 cmd.exe 102 PID 404 wrote to memory of 1392 404 cmd.exe 102 PID 404 wrote to memory of 3100 404 cmd.exe 104 PID 404 wrote to memory of 3100 404 cmd.exe 104 PID 404 wrote to memory of 3100 404 cmd.exe 104 PID 3188 wrote to memory of 2400 3188 saves.exe 108 PID 3188 wrote to memory of 2400 3188 saves.exe 108 PID 3188 wrote to memory of 2400 3188 saves.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d7744165c443a6900ed139eeaee80ecebaf4fd7205ad.exe"C:\Users\Admin\AppData\Local\Temp\2d7744165c443a6900ed139eeaee80ecebaf4fd7205ad.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3615523.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3615523.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7116985.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7116985.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2709437.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2709437.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4254317.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4254317.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0054376.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0054376.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4800
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2292
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:908
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:3240
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:1392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:3100
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:2400
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7523209.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7523209.exe4⤵
- Executes dropped EXE
PID:5064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1688
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1880
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5138a4bca3e17f8988005ffe11aec547f
SHA138ad5d6fbb5b7747329464093a7196eee2523302
SHA2567272ef6afc0b517aae628ae36e123d93b534b4e57877109cdaddf5a809979040
SHA51230f95fe6d3a39098a21e2b6d5b475503437d9dc641d4c7373129a0f128193efeb7384506289916faa42a3f15899b36e05c0772c0f1600778ada947a62fac1f09
-
Filesize
599KB
MD5138a4bca3e17f8988005ffe11aec547f
SHA138ad5d6fbb5b7747329464093a7196eee2523302
SHA2567272ef6afc0b517aae628ae36e123d93b534b4e57877109cdaddf5a809979040
SHA51230f95fe6d3a39098a21e2b6d5b475503437d9dc641d4c7373129a0f128193efeb7384506289916faa42a3f15899b36e05c0772c0f1600778ada947a62fac1f09
-
Filesize
433KB
MD524f4b32b0112d0df20dc5a0b688da573
SHA1369ac079dbf9c1061fdf0bfd8437c27879ddc6b4
SHA2567a6269eba915b03f6821363efadf55d6c9ada0e8d96638f8fd68388695b36a20
SHA5124f1f00affdd358154faa654d5da52c097e515c0e36ac665d889ce32e600c70634cfa9ee22939ee0054403398c9b33e0e9a1e1af630f59f3551bbf1f7582d4109
-
Filesize
433KB
MD524f4b32b0112d0df20dc5a0b688da573
SHA1369ac079dbf9c1061fdf0bfd8437c27879ddc6b4
SHA2567a6269eba915b03f6821363efadf55d6c9ada0e8d96638f8fd68388695b36a20
SHA5124f1f00affdd358154faa654d5da52c097e515c0e36ac665d889ce32e600c70634cfa9ee22939ee0054403398c9b33e0e9a1e1af630f59f3551bbf1f7582d4109
-
Filesize
173KB
MD5afc81b31bee97badacf7ae424801021a
SHA14e2d949c1bf7b6f58d7de310342c101dcd4657a8
SHA2567d7995a94bbfa1bb1909a6260ed3f7cc393c94362286300d86017b18dc2fc3f7
SHA512a1f67cf4c6c7930c454777a26666355bc63d4e33c5ded16828c4bd22b4b113447e8e75aa2302ef9a3b80d70be8c14cfc47d88cd4372037b6a176f91a9773ed73
-
Filesize
173KB
MD5afc81b31bee97badacf7ae424801021a
SHA14e2d949c1bf7b6f58d7de310342c101dcd4657a8
SHA2567d7995a94bbfa1bb1909a6260ed3f7cc393c94362286300d86017b18dc2fc3f7
SHA512a1f67cf4c6c7930c454777a26666355bc63d4e33c5ded16828c4bd22b4b113447e8e75aa2302ef9a3b80d70be8c14cfc47d88cd4372037b6a176f91a9773ed73
-
Filesize
277KB
MD587ed4e3b7f132f917803a36aafffc1d1
SHA13c1b5b10ce47b8b2d97164ad8d6159f5c7caf777
SHA256c11ebeae02c88bbef852d6ad190122d4f947f26e834b6873830fece4c21061f1
SHA512783877d3150333c50d64bc1a8c7de9bcef64359f41d0c99793ca08791d62f2254954b95de93d840c45b1774ce61979cad064dc12e5e4a4931383d4e467e89119
-
Filesize
277KB
MD587ed4e3b7f132f917803a36aafffc1d1
SHA13c1b5b10ce47b8b2d97164ad8d6159f5c7caf777
SHA256c11ebeae02c88bbef852d6ad190122d4f947f26e834b6873830fece4c21061f1
SHA512783877d3150333c50d64bc1a8c7de9bcef64359f41d0c99793ca08791d62f2254954b95de93d840c45b1774ce61979cad064dc12e5e4a4931383d4e467e89119
-
Filesize
15KB
MD5c31a592d0e50d0551c9aecb350493ca4
SHA1bdc66dd07c514e59865afb64b34e62fc7840198b
SHA256107826ae9847f4c66430224aceb5806a0379686bdf5b1fe0ec1c4a041437fc77
SHA512f43178449408671a4b28b1156966b85dd0510ea1c6eda59490651dc836d72708fce251bb7c2377f8b89b2f759371cd548d7573aaafe2a919faf220515598a526
-
Filesize
15KB
MD5c31a592d0e50d0551c9aecb350493ca4
SHA1bdc66dd07c514e59865afb64b34e62fc7840198b
SHA256107826ae9847f4c66430224aceb5806a0379686bdf5b1fe0ec1c4a041437fc77
SHA512f43178449408671a4b28b1156966b85dd0510ea1c6eda59490651dc836d72708fce251bb7c2377f8b89b2f759371cd548d7573aaafe2a919faf220515598a526
-
Filesize
321KB
MD56f155889498a8296c089cd6622dfeedd
SHA152babc66be6d787d923f09c449be2e7c96e34c4a
SHA25699f0026cdd19ce0d42a6030a6e7a15d1c9d577f99f2e88d7bab3d64016497257
SHA512eba3edfb812681f4040d97800980003e66e069081f8ead678a670129c29368052a6b63455b63cc1d7e875b9eb25fc1ad3c843b49176ff944de3e0ae3a2abd13b
-
Filesize
321KB
MD56f155889498a8296c089cd6622dfeedd
SHA152babc66be6d787d923f09c449be2e7c96e34c4a
SHA25699f0026cdd19ce0d42a6030a6e7a15d1c9d577f99f2e88d7bab3d64016497257
SHA512eba3edfb812681f4040d97800980003e66e069081f8ead678a670129c29368052a6b63455b63cc1d7e875b9eb25fc1ad3c843b49176ff944de3e0ae3a2abd13b
-
Filesize
321KB
MD56f155889498a8296c089cd6622dfeedd
SHA152babc66be6d787d923f09c449be2e7c96e34c4a
SHA25699f0026cdd19ce0d42a6030a6e7a15d1c9d577f99f2e88d7bab3d64016497257
SHA512eba3edfb812681f4040d97800980003e66e069081f8ead678a670129c29368052a6b63455b63cc1d7e875b9eb25fc1ad3c843b49176ff944de3e0ae3a2abd13b
-
Filesize
321KB
MD56f155889498a8296c089cd6622dfeedd
SHA152babc66be6d787d923f09c449be2e7c96e34c4a
SHA25699f0026cdd19ce0d42a6030a6e7a15d1c9d577f99f2e88d7bab3d64016497257
SHA512eba3edfb812681f4040d97800980003e66e069081f8ead678a670129c29368052a6b63455b63cc1d7e875b9eb25fc1ad3c843b49176ff944de3e0ae3a2abd13b
-
Filesize
321KB
MD56f155889498a8296c089cd6622dfeedd
SHA152babc66be6d787d923f09c449be2e7c96e34c4a
SHA25699f0026cdd19ce0d42a6030a6e7a15d1c9d577f99f2e88d7bab3d64016497257
SHA512eba3edfb812681f4040d97800980003e66e069081f8ead678a670129c29368052a6b63455b63cc1d7e875b9eb25fc1ad3c843b49176ff944de3e0ae3a2abd13b
-
Filesize
321KB
MD56f155889498a8296c089cd6622dfeedd
SHA152babc66be6d787d923f09c449be2e7c96e34c4a
SHA25699f0026cdd19ce0d42a6030a6e7a15d1c9d577f99f2e88d7bab3d64016497257
SHA512eba3edfb812681f4040d97800980003e66e069081f8ead678a670129c29368052a6b63455b63cc1d7e875b9eb25fc1ad3c843b49176ff944de3e0ae3a2abd13b
-
Filesize
321KB
MD56f155889498a8296c089cd6622dfeedd
SHA152babc66be6d787d923f09c449be2e7c96e34c4a
SHA25699f0026cdd19ce0d42a6030a6e7a15d1c9d577f99f2e88d7bab3d64016497257
SHA512eba3edfb812681f4040d97800980003e66e069081f8ead678a670129c29368052a6b63455b63cc1d7e875b9eb25fc1ad3c843b49176ff944de3e0ae3a2abd13b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7