Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2023, 10:17
Static task
static1
Behavioral task
behavioral1
Sample
d2b36ecb13bea5485e11c8391913b658.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
d2b36ecb13bea5485e11c8391913b658.exe
Resource
win10v2004-20230703-en
General
-
Target
d2b36ecb13bea5485e11c8391913b658.exe
-
Size
705KB
-
MD5
d2b36ecb13bea5485e11c8391913b658
-
SHA1
bb4e2a2ce0fe32705a51a7a92f6b0cd85e57fa0d
-
SHA256
a2ddc9a812ef124b685b33cd064ce6e5cbacaff71fe3cce0bf3a511a20eee0b7
-
SHA512
c1a4ab5cd7534b84d6c3b750dbe4e3055983e7e3a96bcf83aee594528aca4fe3e06fd1c3294eed74dbed1766e314d4c6589222d087e8d9b31fbc3d0828dcbc6e
-
SSDEEP
12288:8Mrhy901dbBZyqUrJdhM2tT/dE8iKDwvO322slu2anXIzJoS:VyofrGR9tDdE8iywvjyWKS
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
nrava
77.91.124.82:19071
-
auth_value
43fe50e9ee6afb85588e03ac9676e2f7
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/files/0x000800000002323c-26.dat healer behavioral2/files/0x000800000002323c-27.dat healer behavioral2/memory/3260-28-0x0000000000CA0000-0x0000000000CAA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g2982623.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g2982623.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g2982623.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g2982623.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g2982623.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g2982623.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/files/0x000700000002323a-45.dat family_redline behavioral2/files/0x000700000002323a-46.dat family_redline behavioral2/memory/3892-47-0x0000000000B20000-0x0000000000B50000-memory.dmp family_redline -
Executes dropped EXE 9 IoCs
pid Process 4428 x4264242.exe 1536 x1030990.exe 2976 x0106409.exe 3260 g2982623.exe 1816 h5390250.exe 1784 saves.exe 3892 i9195708.exe 2516 saves.exe 2684 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4888 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g2982623.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d2b36ecb13bea5485e11c8391913b658.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4264242.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1030990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0106409.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1180 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3260 g2982623.exe 3260 g2982623.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3260 g2982623.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 508 wrote to memory of 4428 508 d2b36ecb13bea5485e11c8391913b658.exe 82 PID 508 wrote to memory of 4428 508 d2b36ecb13bea5485e11c8391913b658.exe 82 PID 508 wrote to memory of 4428 508 d2b36ecb13bea5485e11c8391913b658.exe 82 PID 4428 wrote to memory of 1536 4428 x4264242.exe 83 PID 4428 wrote to memory of 1536 4428 x4264242.exe 83 PID 4428 wrote to memory of 1536 4428 x4264242.exe 83 PID 1536 wrote to memory of 2976 1536 x1030990.exe 84 PID 1536 wrote to memory of 2976 1536 x1030990.exe 84 PID 1536 wrote to memory of 2976 1536 x1030990.exe 84 PID 2976 wrote to memory of 3260 2976 x0106409.exe 85 PID 2976 wrote to memory of 3260 2976 x0106409.exe 85 PID 2976 wrote to memory of 1816 2976 x0106409.exe 91 PID 2976 wrote to memory of 1816 2976 x0106409.exe 91 PID 2976 wrote to memory of 1816 2976 x0106409.exe 91 PID 1816 wrote to memory of 1784 1816 h5390250.exe 92 PID 1816 wrote to memory of 1784 1816 h5390250.exe 92 PID 1816 wrote to memory of 1784 1816 h5390250.exe 92 PID 1536 wrote to memory of 3892 1536 x1030990.exe 93 PID 1536 wrote to memory of 3892 1536 x1030990.exe 93 PID 1536 wrote to memory of 3892 1536 x1030990.exe 93 PID 1784 wrote to memory of 1180 1784 saves.exe 94 PID 1784 wrote to memory of 1180 1784 saves.exe 94 PID 1784 wrote to memory of 1180 1784 saves.exe 94 PID 1784 wrote to memory of 3056 1784 saves.exe 95 PID 1784 wrote to memory of 3056 1784 saves.exe 95 PID 1784 wrote to memory of 3056 1784 saves.exe 95 PID 3056 wrote to memory of 4108 3056 cmd.exe 98 PID 3056 wrote to memory of 4108 3056 cmd.exe 98 PID 3056 wrote to memory of 4108 3056 cmd.exe 98 PID 3056 wrote to memory of 1776 3056 cmd.exe 99 PID 3056 wrote to memory of 1776 3056 cmd.exe 99 PID 3056 wrote to memory of 1776 3056 cmd.exe 99 PID 3056 wrote to memory of 4788 3056 cmd.exe 100 PID 3056 wrote to memory of 4788 3056 cmd.exe 100 PID 3056 wrote to memory of 4788 3056 cmd.exe 100 PID 3056 wrote to memory of 2924 3056 cmd.exe 102 PID 3056 wrote to memory of 2924 3056 cmd.exe 102 PID 3056 wrote to memory of 2924 3056 cmd.exe 102 PID 3056 wrote to memory of 4932 3056 cmd.exe 101 PID 3056 wrote to memory of 4932 3056 cmd.exe 101 PID 3056 wrote to memory of 4932 3056 cmd.exe 101 PID 3056 wrote to memory of 1164 3056 cmd.exe 103 PID 3056 wrote to memory of 1164 3056 cmd.exe 103 PID 3056 wrote to memory of 1164 3056 cmd.exe 103 PID 1784 wrote to memory of 4888 1784 saves.exe 110 PID 1784 wrote to memory of 4888 1784 saves.exe 110 PID 1784 wrote to memory of 4888 1784 saves.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2b36ecb13bea5485e11c8391913b658.exe"C:\Users\Admin\AppData\Local\Temp\d2b36ecb13bea5485e11c8391913b658.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4264242.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4264242.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1030990.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1030990.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0106409.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0106409.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2982623.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2982623.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5390250.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h5390250.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1180
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4108
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:1776
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4788
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2924
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:1164
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4888
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9195708.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i9195708.exe4⤵
- Executes dropped EXE
PID:3892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2516
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2684
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD54daddd33eba427898fad87fe4b24466f
SHA1d6745860c375f211a4d3d142bd97b2d4401ec80b
SHA25672930d6b2be2e47d3d78ee79204d8a8b406293fa1100fb2a1370329274cb7aa1
SHA5127476446623facef83698d04339ff3dc78fc72db09d06a9caa31f283b533fd18d81bec7ae229b267d8e1324e3290f048a52ebb3c082ef0042c117a4efbb5dd361
-
Filesize
599KB
MD54daddd33eba427898fad87fe4b24466f
SHA1d6745860c375f211a4d3d142bd97b2d4401ec80b
SHA25672930d6b2be2e47d3d78ee79204d8a8b406293fa1100fb2a1370329274cb7aa1
SHA5127476446623facef83698d04339ff3dc78fc72db09d06a9caa31f283b533fd18d81bec7ae229b267d8e1324e3290f048a52ebb3c082ef0042c117a4efbb5dd361
-
Filesize
433KB
MD5a4d799d267d2a4edc1b32ff64466daea
SHA117583a662c8698daaf7f11a034baad925b3a5003
SHA256447ee6796d73407092cbbf5ac448dd6aa16b0ffc48dea8bb2cda3c2415e6211d
SHA51216c0fb83e6b91b44bf2f8faec40e8686680e9577839c0b74cf1a29e200b31c1557d53668e8411ddef97c1ff1b34d6deb5b09ef8eaa1de49585528f7e1b514d09
-
Filesize
433KB
MD5a4d799d267d2a4edc1b32ff64466daea
SHA117583a662c8698daaf7f11a034baad925b3a5003
SHA256447ee6796d73407092cbbf5ac448dd6aa16b0ffc48dea8bb2cda3c2415e6211d
SHA51216c0fb83e6b91b44bf2f8faec40e8686680e9577839c0b74cf1a29e200b31c1557d53668e8411ddef97c1ff1b34d6deb5b09ef8eaa1de49585528f7e1b514d09
-
Filesize
173KB
MD537d0f8292e55fa289d5f95ab2895accc
SHA1587b147de008f6ed0cda99f79bb14ff9792a44b9
SHA256e1c0d77490fcf0474fc03c79fd1153318d65515f75fc0a79c703c3a0853344ce
SHA51286cc1eb16172f6f3fc525816824fcd22925ceca428a579e2bbbadbc1e68c2d705e7250694bb60f52ee8d191be7fc5252f99eb31dacecd77f02f8a397b92c0530
-
Filesize
173KB
MD537d0f8292e55fa289d5f95ab2895accc
SHA1587b147de008f6ed0cda99f79bb14ff9792a44b9
SHA256e1c0d77490fcf0474fc03c79fd1153318d65515f75fc0a79c703c3a0853344ce
SHA51286cc1eb16172f6f3fc525816824fcd22925ceca428a579e2bbbadbc1e68c2d705e7250694bb60f52ee8d191be7fc5252f99eb31dacecd77f02f8a397b92c0530
-
Filesize
277KB
MD598fa321707eeaf4352d386184f344b69
SHA160ba9a015f18177f709fb6c087f16319de776d3b
SHA25612d6c8eac59a3ec25f2c9ee6a2fb37fece37bffa8280d105090e42da94436739
SHA51292f432ae50622bdebc00f1af2f42ef5eb223469e3c86cd1a3a747053ff9c218616c45b4de87047a7153d716208f4fa04a78e4b28b4d515ce2f799b13c84e171f
-
Filesize
277KB
MD598fa321707eeaf4352d386184f344b69
SHA160ba9a015f18177f709fb6c087f16319de776d3b
SHA25612d6c8eac59a3ec25f2c9ee6a2fb37fece37bffa8280d105090e42da94436739
SHA51292f432ae50622bdebc00f1af2f42ef5eb223469e3c86cd1a3a747053ff9c218616c45b4de87047a7153d716208f4fa04a78e4b28b4d515ce2f799b13c84e171f
-
Filesize
15KB
MD5008abe44e16a7021e4fd78726ea7a321
SHA1e57e9f4df9be39d2bb82755844c934d54c36b261
SHA25608db5491e66d7696a463f50ed30d026e30af2f24847d4bc538337bc2606611b5
SHA5123e3c2a8d5a14e8e2fdfcac9dd87e4cd32bbdbb6dd8f450cad3989d4768d586e98b70566f9505189dfa6d9704cd981a1f4dab750b6058b81b38699ca4de8e018d
-
Filesize
15KB
MD5008abe44e16a7021e4fd78726ea7a321
SHA1e57e9f4df9be39d2bb82755844c934d54c36b261
SHA25608db5491e66d7696a463f50ed30d026e30af2f24847d4bc538337bc2606611b5
SHA5123e3c2a8d5a14e8e2fdfcac9dd87e4cd32bbdbb6dd8f450cad3989d4768d586e98b70566f9505189dfa6d9704cd981a1f4dab750b6058b81b38699ca4de8e018d
-
Filesize
321KB
MD50f8933d4aa6a8295289029d267e07ee2
SHA104080ea073efb9a2983741ecbcc8d235889de59a
SHA25679d0b39917eaa608e2e98de6f03f7a5ef505858e3d7e9719d3efd95d5c5b1996
SHA512944a86baa5e4bb21fa4eed62a976ebd72754e455c245b3fd941337c47c3754cbd1c729c7022a509d8febbf1475776cd99c98b78d6560937463db37844ff021c5
-
Filesize
321KB
MD50f8933d4aa6a8295289029d267e07ee2
SHA104080ea073efb9a2983741ecbcc8d235889de59a
SHA25679d0b39917eaa608e2e98de6f03f7a5ef505858e3d7e9719d3efd95d5c5b1996
SHA512944a86baa5e4bb21fa4eed62a976ebd72754e455c245b3fd941337c47c3754cbd1c729c7022a509d8febbf1475776cd99c98b78d6560937463db37844ff021c5
-
Filesize
321KB
MD50f8933d4aa6a8295289029d267e07ee2
SHA104080ea073efb9a2983741ecbcc8d235889de59a
SHA25679d0b39917eaa608e2e98de6f03f7a5ef505858e3d7e9719d3efd95d5c5b1996
SHA512944a86baa5e4bb21fa4eed62a976ebd72754e455c245b3fd941337c47c3754cbd1c729c7022a509d8febbf1475776cd99c98b78d6560937463db37844ff021c5
-
Filesize
321KB
MD50f8933d4aa6a8295289029d267e07ee2
SHA104080ea073efb9a2983741ecbcc8d235889de59a
SHA25679d0b39917eaa608e2e98de6f03f7a5ef505858e3d7e9719d3efd95d5c5b1996
SHA512944a86baa5e4bb21fa4eed62a976ebd72754e455c245b3fd941337c47c3754cbd1c729c7022a509d8febbf1475776cd99c98b78d6560937463db37844ff021c5
-
Filesize
321KB
MD50f8933d4aa6a8295289029d267e07ee2
SHA104080ea073efb9a2983741ecbcc8d235889de59a
SHA25679d0b39917eaa608e2e98de6f03f7a5ef505858e3d7e9719d3efd95d5c5b1996
SHA512944a86baa5e4bb21fa4eed62a976ebd72754e455c245b3fd941337c47c3754cbd1c729c7022a509d8febbf1475776cd99c98b78d6560937463db37844ff021c5
-
Filesize
321KB
MD50f8933d4aa6a8295289029d267e07ee2
SHA104080ea073efb9a2983741ecbcc8d235889de59a
SHA25679d0b39917eaa608e2e98de6f03f7a5ef505858e3d7e9719d3efd95d5c5b1996
SHA512944a86baa5e4bb21fa4eed62a976ebd72754e455c245b3fd941337c47c3754cbd1c729c7022a509d8febbf1475776cd99c98b78d6560937463db37844ff021c5
-
Filesize
321KB
MD50f8933d4aa6a8295289029d267e07ee2
SHA104080ea073efb9a2983741ecbcc8d235889de59a
SHA25679d0b39917eaa608e2e98de6f03f7a5ef505858e3d7e9719d3efd95d5c5b1996
SHA512944a86baa5e4bb21fa4eed62a976ebd72754e455c245b3fd941337c47c3754cbd1c729c7022a509d8febbf1475776cd99c98b78d6560937463db37844ff021c5
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7