Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2023 10:30
Static task
static1
Behavioral task
behavioral1
Sample
201842a26087ded6da29cc73bda65c81c7cdd5fcbddc5dd2004385f03e076c8e.exe
Resource
win10v2004-20230703-en
General
-
Target
201842a26087ded6da29cc73bda65c81c7cdd5fcbddc5dd2004385f03e076c8e.exe
-
Size
704KB
-
MD5
e5399b9c4c59eb7b93126cd8e15009fe
-
SHA1
d45ddbb733754d1bb0ad75745da1757ca5c7fada
-
SHA256
201842a26087ded6da29cc73bda65c81c7cdd5fcbddc5dd2004385f03e076c8e
-
SHA512
cf13b5a4a8489b45a975c8731ee07f05632e7400f8c33e2c211f84bc9368d9a06f4e6a79b446fb8972d45c19637a2964e2c9ca1b645cb4ba569513003f3404f6
-
SSDEEP
12288:xMr3y90HeK4wyMtyTSr5/8BmWgitbUYX7vDZUp6UmC6ZVgmI0oir0GKRBRLWp:qyIeKvyMe2F8sopbSoxC2gmI0o0KR2p
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00080000000231e9-27.dat healer behavioral1/files/0x00080000000231e9-26.dat healer behavioral1/memory/1088-28-0x0000000000D50000-0x0000000000D5A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g0439476.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g0439476.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g0439476.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g0439476.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g0439476.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g0439476.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 1932 x7477082.exe 2488 x2898756.exe 1628 x4383650.exe 1088 g0439476.exe 4304 h3033306.exe 4940 saves.exe 4316 i1412615.exe 4144 saves.exe 2468 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 944 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g0439476.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 201842a26087ded6da29cc73bda65c81c7cdd5fcbddc5dd2004385f03e076c8e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7477082.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2898756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4383650.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1592 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1088 g0439476.exe 1088 g0439476.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1088 g0439476.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4796 wrote to memory of 1932 4796 201842a26087ded6da29cc73bda65c81c7cdd5fcbddc5dd2004385f03e076c8e.exe 81 PID 4796 wrote to memory of 1932 4796 201842a26087ded6da29cc73bda65c81c7cdd5fcbddc5dd2004385f03e076c8e.exe 81 PID 4796 wrote to memory of 1932 4796 201842a26087ded6da29cc73bda65c81c7cdd5fcbddc5dd2004385f03e076c8e.exe 81 PID 1932 wrote to memory of 2488 1932 x7477082.exe 82 PID 1932 wrote to memory of 2488 1932 x7477082.exe 82 PID 1932 wrote to memory of 2488 1932 x7477082.exe 82 PID 2488 wrote to memory of 1628 2488 x2898756.exe 83 PID 2488 wrote to memory of 1628 2488 x2898756.exe 83 PID 2488 wrote to memory of 1628 2488 x2898756.exe 83 PID 1628 wrote to memory of 1088 1628 x4383650.exe 84 PID 1628 wrote to memory of 1088 1628 x4383650.exe 84 PID 1628 wrote to memory of 4304 1628 x4383650.exe 85 PID 1628 wrote to memory of 4304 1628 x4383650.exe 85 PID 1628 wrote to memory of 4304 1628 x4383650.exe 85 PID 4304 wrote to memory of 4940 4304 h3033306.exe 86 PID 4304 wrote to memory of 4940 4304 h3033306.exe 86 PID 4304 wrote to memory of 4940 4304 h3033306.exe 86 PID 2488 wrote to memory of 4316 2488 x2898756.exe 87 PID 2488 wrote to memory of 4316 2488 x2898756.exe 87 PID 2488 wrote to memory of 4316 2488 x2898756.exe 87 PID 4940 wrote to memory of 1592 4940 saves.exe 88 PID 4940 wrote to memory of 1592 4940 saves.exe 88 PID 4940 wrote to memory of 1592 4940 saves.exe 88 PID 4940 wrote to memory of 4004 4940 saves.exe 90 PID 4940 wrote to memory of 4004 4940 saves.exe 90 PID 4940 wrote to memory of 4004 4940 saves.exe 90 PID 4004 wrote to memory of 1872 4004 cmd.exe 92 PID 4004 wrote to memory of 1872 4004 cmd.exe 92 PID 4004 wrote to memory of 1872 4004 cmd.exe 92 PID 4004 wrote to memory of 3176 4004 cmd.exe 93 PID 4004 wrote to memory of 3176 4004 cmd.exe 93 PID 4004 wrote to memory of 3176 4004 cmd.exe 93 PID 4004 wrote to memory of 2944 4004 cmd.exe 94 PID 4004 wrote to memory of 2944 4004 cmd.exe 94 PID 4004 wrote to memory of 2944 4004 cmd.exe 94 PID 4004 wrote to memory of 4196 4004 cmd.exe 95 PID 4004 wrote to memory of 4196 4004 cmd.exe 95 PID 4004 wrote to memory of 4196 4004 cmd.exe 95 PID 4004 wrote to memory of 544 4004 cmd.exe 96 PID 4004 wrote to memory of 544 4004 cmd.exe 96 PID 4004 wrote to memory of 544 4004 cmd.exe 96 PID 4004 wrote to memory of 4468 4004 cmd.exe 97 PID 4004 wrote to memory of 4468 4004 cmd.exe 97 PID 4004 wrote to memory of 4468 4004 cmd.exe 97 PID 4940 wrote to memory of 944 4940 saves.exe 99 PID 4940 wrote to memory of 944 4940 saves.exe 99 PID 4940 wrote to memory of 944 4940 saves.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\201842a26087ded6da29cc73bda65c81c7cdd5fcbddc5dd2004385f03e076c8e.exe"C:\Users\Admin\AppData\Local\Temp\201842a26087ded6da29cc73bda65c81c7cdd5fcbddc5dd2004385f03e076c8e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7477082.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7477082.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2898756.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2898756.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4383650.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4383650.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0439476.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0439476.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3033306.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3033306.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1592
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1872
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:3176
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2944
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4196
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:4468
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:944
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1412615.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i1412615.exe4⤵
- Executes dropped EXE
PID:4316
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4144
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2468
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD5bfdcb0b4b978003d1475602ab779ad6c
SHA1b129a8d23fc96758e04bd59c3fe22339519e541c
SHA2563813fa9656e670c91649f4f8b9c149e3c23a2912804105778f5eaa49cd061562
SHA512b2478614967f3d2cd1544b64b18dfd1f8e1818f5add7d643c72b69947bf3b73d3e69b4b660d9d37bd7565dcae57c437fecbf29573bb9e973a35cd38cdf370622
-
Filesize
598KB
MD5bfdcb0b4b978003d1475602ab779ad6c
SHA1b129a8d23fc96758e04bd59c3fe22339519e541c
SHA2563813fa9656e670c91649f4f8b9c149e3c23a2912804105778f5eaa49cd061562
SHA512b2478614967f3d2cd1544b64b18dfd1f8e1818f5add7d643c72b69947bf3b73d3e69b4b660d9d37bd7565dcae57c437fecbf29573bb9e973a35cd38cdf370622
-
Filesize
432KB
MD5847968df71e28993db31fb44ad9c3f47
SHA1b07867bd007cb9774248044ecb8fe7875c8cb8cc
SHA25662a286f5ea51517ba818a3c0b4f1580a007a02a69180809d61e7dce63bff25c0
SHA5129d33c9fc5874ab8dd6894aa2ef9a9bc633ef95db464a4d211467c748233930a0b83e44c9f4a781ff0661b42709e3ed12f80af50ae459b9481516c2fb2645ab17
-
Filesize
432KB
MD5847968df71e28993db31fb44ad9c3f47
SHA1b07867bd007cb9774248044ecb8fe7875c8cb8cc
SHA25662a286f5ea51517ba818a3c0b4f1580a007a02a69180809d61e7dce63bff25c0
SHA5129d33c9fc5874ab8dd6894aa2ef9a9bc633ef95db464a4d211467c748233930a0b83e44c9f4a781ff0661b42709e3ed12f80af50ae459b9481516c2fb2645ab17
-
Filesize
174KB
MD5e528a38e601e87d6dfe5ace48eda03c7
SHA1ff304867e66fc45dda82afe5705dd2db42256ff3
SHA2560ad38dd5618cf717ddc7ffcd5fa2d604258c552faeb186552739675147691bb6
SHA512b0cbc821691399123e96276c53744c14bfb0ccd67a6b8fc53f8938016142f70842bf09e374492304ea67bc7f9f7533c37bd4b63e8e40b3ca9ee440ae481e37f8
-
Filesize
174KB
MD5e528a38e601e87d6dfe5ace48eda03c7
SHA1ff304867e66fc45dda82afe5705dd2db42256ff3
SHA2560ad38dd5618cf717ddc7ffcd5fa2d604258c552faeb186552739675147691bb6
SHA512b0cbc821691399123e96276c53744c14bfb0ccd67a6b8fc53f8938016142f70842bf09e374492304ea67bc7f9f7533c37bd4b63e8e40b3ca9ee440ae481e37f8
-
Filesize
277KB
MD56763b2f19528a556c16d72760c1cd2a2
SHA119956dab7a8b7f56df8f0c3c9b54af150dfec40b
SHA256b8fa3c6e3520459f237213a845ae9b73bde1bbb9fce1c7a5581218a7be0d664f
SHA5120386c02210b95fa24b4ecf10cd7b9ea77e1b19be3187bb022120623bad112beac4ed4b62e3ecc06c2a19ec5c7fdceb727ee0b79b9bd5b51f856e421752bbe8e3
-
Filesize
277KB
MD56763b2f19528a556c16d72760c1cd2a2
SHA119956dab7a8b7f56df8f0c3c9b54af150dfec40b
SHA256b8fa3c6e3520459f237213a845ae9b73bde1bbb9fce1c7a5581218a7be0d664f
SHA5120386c02210b95fa24b4ecf10cd7b9ea77e1b19be3187bb022120623bad112beac4ed4b62e3ecc06c2a19ec5c7fdceb727ee0b79b9bd5b51f856e421752bbe8e3
-
Filesize
16KB
MD57f8d5b061831de24e6ed92c010079349
SHA1f025498467b89ed833839ab0505fdd604c28ed60
SHA2569e35f01769c6fb370368098f18f5c78dba8b8ca37ac5af03309618dba7477418
SHA512be7b5eb90ed42a554e71f0fb62653338b5b97f3f777045bca5c53ea1502d59957ad9e57a636acce4606d64996d830f8aab0799364230091bc1b5616b011de071
-
Filesize
16KB
MD57f8d5b061831de24e6ed92c010079349
SHA1f025498467b89ed833839ab0505fdd604c28ed60
SHA2569e35f01769c6fb370368098f18f5c78dba8b8ca37ac5af03309618dba7477418
SHA512be7b5eb90ed42a554e71f0fb62653338b5b97f3f777045bca5c53ea1502d59957ad9e57a636acce4606d64996d830f8aab0799364230091bc1b5616b011de071
-
Filesize
323KB
MD5fb03463fc264e433aa789da111780deb
SHA13097b55da4f1142ae219b9b02943ad55704d42ad
SHA256b70e69c8bd8d4cbedadacd10b2f22d2a3d082449a4e0a4cf4ccee34ff0de462b
SHA512f332b83cb5cb64ae1b9814a5248b105d58ab38d4253bca464b6a4a96c9a90078dc30d048a69145eb245d18995b2693c5ffafe4b9eca568c39901065a41352f4b
-
Filesize
323KB
MD5fb03463fc264e433aa789da111780deb
SHA13097b55da4f1142ae219b9b02943ad55704d42ad
SHA256b70e69c8bd8d4cbedadacd10b2f22d2a3d082449a4e0a4cf4ccee34ff0de462b
SHA512f332b83cb5cb64ae1b9814a5248b105d58ab38d4253bca464b6a4a96c9a90078dc30d048a69145eb245d18995b2693c5ffafe4b9eca568c39901065a41352f4b
-
Filesize
323KB
MD5fb03463fc264e433aa789da111780deb
SHA13097b55da4f1142ae219b9b02943ad55704d42ad
SHA256b70e69c8bd8d4cbedadacd10b2f22d2a3d082449a4e0a4cf4ccee34ff0de462b
SHA512f332b83cb5cb64ae1b9814a5248b105d58ab38d4253bca464b6a4a96c9a90078dc30d048a69145eb245d18995b2693c5ffafe4b9eca568c39901065a41352f4b
-
Filesize
323KB
MD5fb03463fc264e433aa789da111780deb
SHA13097b55da4f1142ae219b9b02943ad55704d42ad
SHA256b70e69c8bd8d4cbedadacd10b2f22d2a3d082449a4e0a4cf4ccee34ff0de462b
SHA512f332b83cb5cb64ae1b9814a5248b105d58ab38d4253bca464b6a4a96c9a90078dc30d048a69145eb245d18995b2693c5ffafe4b9eca568c39901065a41352f4b
-
Filesize
323KB
MD5fb03463fc264e433aa789da111780deb
SHA13097b55da4f1142ae219b9b02943ad55704d42ad
SHA256b70e69c8bd8d4cbedadacd10b2f22d2a3d082449a4e0a4cf4ccee34ff0de462b
SHA512f332b83cb5cb64ae1b9814a5248b105d58ab38d4253bca464b6a4a96c9a90078dc30d048a69145eb245d18995b2693c5ffafe4b9eca568c39901065a41352f4b
-
Filesize
323KB
MD5fb03463fc264e433aa789da111780deb
SHA13097b55da4f1142ae219b9b02943ad55704d42ad
SHA256b70e69c8bd8d4cbedadacd10b2f22d2a3d082449a4e0a4cf4ccee34ff0de462b
SHA512f332b83cb5cb64ae1b9814a5248b105d58ab38d4253bca464b6a4a96c9a90078dc30d048a69145eb245d18995b2693c5ffafe4b9eca568c39901065a41352f4b
-
Filesize
323KB
MD5fb03463fc264e433aa789da111780deb
SHA13097b55da4f1142ae219b9b02943ad55704d42ad
SHA256b70e69c8bd8d4cbedadacd10b2f22d2a3d082449a4e0a4cf4ccee34ff0de462b
SHA512f332b83cb5cb64ae1b9814a5248b105d58ab38d4253bca464b6a4a96c9a90078dc30d048a69145eb245d18995b2693c5ffafe4b9eca568c39901065a41352f4b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7