Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2023 18:16
Static task
static1
Behavioral task
behavioral1
Sample
99b0a06ed70eb77e42c1444d63c4f7851fcf7bac8653c4e372d6c4abb34f00ae.exe
Resource
win10v2004-20230703-en
General
-
Target
99b0a06ed70eb77e42c1444d63c4f7851fcf7bac8653c4e372d6c4abb34f00ae.exe
-
Size
705KB
-
MD5
c2d03da158b92725a344bceef2f59298
-
SHA1
a7e94185102399a87fbab30ad519fc3efc3cfc35
-
SHA256
99b0a06ed70eb77e42c1444d63c4f7851fcf7bac8653c4e372d6c4abb34f00ae
-
SHA512
0b551bb8f8f01f210d66d2d518fa3124e34a7f3a19dcd531eb59bd94d8a681f19bf45bc900893c099777068ed58c2c0c14e3f40bf6af87bd8669a5cb8cd484e8
-
SSDEEP
12288:TMrhy90mk+0BPhZ/zGUt5TdGFfIM+WcOiGA9UrKsjCUBjumHekQOvZB+:uy1kHZ/dtVYF4VOd7jpjusQok
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x00070000000231df-26.dat healer behavioral1/files/0x00070000000231df-27.dat healer behavioral1/memory/3640-28-0x0000000000230000-0x000000000023A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g5861802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g5861802.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection g5861802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g5861802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g5861802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g5861802.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 1620 x7299009.exe 4116 x9461934.exe 1668 x8803245.exe 3640 g5861802.exe 3016 h0646076.exe 1464 saves.exe 1572 i6925353.exe 1660 saves.exe 3644 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 964 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g5861802.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8803245.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 99b0a06ed70eb77e42c1444d63c4f7851fcf7bac8653c4e372d6c4abb34f00ae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7299009.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9461934.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 416 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3640 g5861802.exe 3640 g5861802.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3640 g5861802.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 432 wrote to memory of 1620 432 99b0a06ed70eb77e42c1444d63c4f7851fcf7bac8653c4e372d6c4abb34f00ae.exe 81 PID 432 wrote to memory of 1620 432 99b0a06ed70eb77e42c1444d63c4f7851fcf7bac8653c4e372d6c4abb34f00ae.exe 81 PID 432 wrote to memory of 1620 432 99b0a06ed70eb77e42c1444d63c4f7851fcf7bac8653c4e372d6c4abb34f00ae.exe 81 PID 1620 wrote to memory of 4116 1620 x7299009.exe 82 PID 1620 wrote to memory of 4116 1620 x7299009.exe 82 PID 1620 wrote to memory of 4116 1620 x7299009.exe 82 PID 4116 wrote to memory of 1668 4116 x9461934.exe 83 PID 4116 wrote to memory of 1668 4116 x9461934.exe 83 PID 4116 wrote to memory of 1668 4116 x9461934.exe 83 PID 1668 wrote to memory of 3640 1668 x8803245.exe 84 PID 1668 wrote to memory of 3640 1668 x8803245.exe 84 PID 1668 wrote to memory of 3016 1668 x8803245.exe 89 PID 1668 wrote to memory of 3016 1668 x8803245.exe 89 PID 1668 wrote to memory of 3016 1668 x8803245.exe 89 PID 3016 wrote to memory of 1464 3016 h0646076.exe 90 PID 3016 wrote to memory of 1464 3016 h0646076.exe 90 PID 3016 wrote to memory of 1464 3016 h0646076.exe 90 PID 4116 wrote to memory of 1572 4116 x9461934.exe 91 PID 4116 wrote to memory of 1572 4116 x9461934.exe 91 PID 4116 wrote to memory of 1572 4116 x9461934.exe 91 PID 1464 wrote to memory of 416 1464 saves.exe 92 PID 1464 wrote to memory of 416 1464 saves.exe 92 PID 1464 wrote to memory of 416 1464 saves.exe 92 PID 1464 wrote to memory of 2888 1464 saves.exe 94 PID 1464 wrote to memory of 2888 1464 saves.exe 94 PID 1464 wrote to memory of 2888 1464 saves.exe 94 PID 2888 wrote to memory of 3100 2888 cmd.exe 96 PID 2888 wrote to memory of 3100 2888 cmd.exe 96 PID 2888 wrote to memory of 3100 2888 cmd.exe 96 PID 2888 wrote to memory of 1516 2888 cmd.exe 97 PID 2888 wrote to memory of 1516 2888 cmd.exe 97 PID 2888 wrote to memory of 1516 2888 cmd.exe 97 PID 2888 wrote to memory of 5052 2888 cmd.exe 98 PID 2888 wrote to memory of 5052 2888 cmd.exe 98 PID 2888 wrote to memory of 5052 2888 cmd.exe 98 PID 2888 wrote to memory of 3052 2888 cmd.exe 99 PID 2888 wrote to memory of 3052 2888 cmd.exe 99 PID 2888 wrote to memory of 3052 2888 cmd.exe 99 PID 2888 wrote to memory of 4904 2888 cmd.exe 100 PID 2888 wrote to memory of 4904 2888 cmd.exe 100 PID 2888 wrote to memory of 4904 2888 cmd.exe 100 PID 2888 wrote to memory of 4764 2888 cmd.exe 101 PID 2888 wrote to memory of 4764 2888 cmd.exe 101 PID 2888 wrote to memory of 4764 2888 cmd.exe 101 PID 1464 wrote to memory of 964 1464 saves.exe 108 PID 1464 wrote to memory of 964 1464 saves.exe 108 PID 1464 wrote to memory of 964 1464 saves.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\99b0a06ed70eb77e42c1444d63c4f7851fcf7bac8653c4e372d6c4abb34f00ae.exe"C:\Users\Admin\AppData\Local\Temp\99b0a06ed70eb77e42c1444d63c4f7851fcf7bac8653c4e372d6c4abb34f00ae.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7299009.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7299009.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9461934.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9461934.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8803245.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8803245.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5861802.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5861802.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0646076.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0646076.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:416
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:1516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:5052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4904
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:4764
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:964
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6925353.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6925353.exe4⤵
- Executes dropped EXE
PID:1572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1660
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3644
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD595100ee5a8dea490ed9aee93d98748dd
SHA1ce4723e7a1ce1d514d675241339f8d21d9fce369
SHA256625c98156dbe395a724fb982b304323355027eca8061d0913033ed9ef9387322
SHA512d7a5eaa285793a8ed7e52cf0ea48c6066a414aa9e84c523494c8d3234d33f56a3ec062dd4fa684fb97c1b01795fa261e1473e9e2ae605de0fb6e17615323abe9
-
Filesize
599KB
MD595100ee5a8dea490ed9aee93d98748dd
SHA1ce4723e7a1ce1d514d675241339f8d21d9fce369
SHA256625c98156dbe395a724fb982b304323355027eca8061d0913033ed9ef9387322
SHA512d7a5eaa285793a8ed7e52cf0ea48c6066a414aa9e84c523494c8d3234d33f56a3ec062dd4fa684fb97c1b01795fa261e1473e9e2ae605de0fb6e17615323abe9
-
Filesize
433KB
MD5b3fecc4669613d2c031a121d03aeef60
SHA1844364dbd63449f7b91f6417b68b10500f575463
SHA256d096e13b92b4525ea216d241b016803cb3c1cd431435ef873dab43d213b8f238
SHA512d0967f0b16291c649257c17ecfbaf433e181c911777bb1848cfcd196d94293483d1915eca11ed591c124364491269b4d497d4d831dc05e6e52b0f09093c552fa
-
Filesize
433KB
MD5b3fecc4669613d2c031a121d03aeef60
SHA1844364dbd63449f7b91f6417b68b10500f575463
SHA256d096e13b92b4525ea216d241b016803cb3c1cd431435ef873dab43d213b8f238
SHA512d0967f0b16291c649257c17ecfbaf433e181c911777bb1848cfcd196d94293483d1915eca11ed591c124364491269b4d497d4d831dc05e6e52b0f09093c552fa
-
Filesize
174KB
MD5c176b6326209bbfb09a0902273e1421f
SHA145e0daac5c7e0deb84028c4700255a9bbc5ff1db
SHA2563499dfd4127464746870cf15017bb079b3734795f8ebf3a53b5ea1d82a5620bd
SHA5126b37e7541db85d62603b241ab28e96129f35973952a005c68ef0499064da69095c36d96665029b1b9cc16a81468da5c57b5a935245e566481c78a2980ec63996
-
Filesize
174KB
MD5c176b6326209bbfb09a0902273e1421f
SHA145e0daac5c7e0deb84028c4700255a9bbc5ff1db
SHA2563499dfd4127464746870cf15017bb079b3734795f8ebf3a53b5ea1d82a5620bd
SHA5126b37e7541db85d62603b241ab28e96129f35973952a005c68ef0499064da69095c36d96665029b1b9cc16a81468da5c57b5a935245e566481c78a2980ec63996
-
Filesize
277KB
MD5b18c1ca8142347f0012bdf4d3eb0d7d9
SHA13a1a4466d1a9293d04273179b64010925bbe2de4
SHA25615409326f73170a96e114becb43c3497f23004f59b4a1ba642e55c100b62ef04
SHA5127b77417a3531d165a7328dba15063caaee70ab99d61883652dc480dfe554a3799d6e9b89dec83502b31d2e32895a50d9361abb5808b22e6e59c3502f25966c6e
-
Filesize
277KB
MD5b18c1ca8142347f0012bdf4d3eb0d7d9
SHA13a1a4466d1a9293d04273179b64010925bbe2de4
SHA25615409326f73170a96e114becb43c3497f23004f59b4a1ba642e55c100b62ef04
SHA5127b77417a3531d165a7328dba15063caaee70ab99d61883652dc480dfe554a3799d6e9b89dec83502b31d2e32895a50d9361abb5808b22e6e59c3502f25966c6e
-
Filesize
16KB
MD502a795bd190476d05d345c8894008987
SHA1da4863f75ec1e70efbd183cb137b9fd86820a3aa
SHA25671a7bda6a32a31661ec94ab7794bf9cefc727ac13b37029640e06d55ef99383a
SHA5125cd56eb127f28bc116176123b19594c5df9585566398b9abfd4daeb8a05af447718e0e5402ea257b0f3d00cf10235eb022736f34fdc657dabb87e9f6159ccc33
-
Filesize
16KB
MD502a795bd190476d05d345c8894008987
SHA1da4863f75ec1e70efbd183cb137b9fd86820a3aa
SHA25671a7bda6a32a31661ec94ab7794bf9cefc727ac13b37029640e06d55ef99383a
SHA5125cd56eb127f28bc116176123b19594c5df9585566398b9abfd4daeb8a05af447718e0e5402ea257b0f3d00cf10235eb022736f34fdc657dabb87e9f6159ccc33
-
Filesize
324KB
MD55b3014597427a15d2fae545fc14856fe
SHA1bd989a0d1a497f79c8ca5bb3a2b73909ab8e49c6
SHA256948d9d8c3f3fc0971f86917d523037a2c48d83e15338ad6555e00297015e494c
SHA5127740d8670550e2fe207e13538bcf0da72d76b3f3a2a6b62b60ed56bd64c1aa470f9e1df8027d0a3ebaa743bbae3e6b01b237fc112114b3fbea60d7dd70877c0e
-
Filesize
324KB
MD55b3014597427a15d2fae545fc14856fe
SHA1bd989a0d1a497f79c8ca5bb3a2b73909ab8e49c6
SHA256948d9d8c3f3fc0971f86917d523037a2c48d83e15338ad6555e00297015e494c
SHA5127740d8670550e2fe207e13538bcf0da72d76b3f3a2a6b62b60ed56bd64c1aa470f9e1df8027d0a3ebaa743bbae3e6b01b237fc112114b3fbea60d7dd70877c0e
-
Filesize
324KB
MD55b3014597427a15d2fae545fc14856fe
SHA1bd989a0d1a497f79c8ca5bb3a2b73909ab8e49c6
SHA256948d9d8c3f3fc0971f86917d523037a2c48d83e15338ad6555e00297015e494c
SHA5127740d8670550e2fe207e13538bcf0da72d76b3f3a2a6b62b60ed56bd64c1aa470f9e1df8027d0a3ebaa743bbae3e6b01b237fc112114b3fbea60d7dd70877c0e
-
Filesize
324KB
MD55b3014597427a15d2fae545fc14856fe
SHA1bd989a0d1a497f79c8ca5bb3a2b73909ab8e49c6
SHA256948d9d8c3f3fc0971f86917d523037a2c48d83e15338ad6555e00297015e494c
SHA5127740d8670550e2fe207e13538bcf0da72d76b3f3a2a6b62b60ed56bd64c1aa470f9e1df8027d0a3ebaa743bbae3e6b01b237fc112114b3fbea60d7dd70877c0e
-
Filesize
324KB
MD55b3014597427a15d2fae545fc14856fe
SHA1bd989a0d1a497f79c8ca5bb3a2b73909ab8e49c6
SHA256948d9d8c3f3fc0971f86917d523037a2c48d83e15338ad6555e00297015e494c
SHA5127740d8670550e2fe207e13538bcf0da72d76b3f3a2a6b62b60ed56bd64c1aa470f9e1df8027d0a3ebaa743bbae3e6b01b237fc112114b3fbea60d7dd70877c0e
-
Filesize
324KB
MD55b3014597427a15d2fae545fc14856fe
SHA1bd989a0d1a497f79c8ca5bb3a2b73909ab8e49c6
SHA256948d9d8c3f3fc0971f86917d523037a2c48d83e15338ad6555e00297015e494c
SHA5127740d8670550e2fe207e13538bcf0da72d76b3f3a2a6b62b60ed56bd64c1aa470f9e1df8027d0a3ebaa743bbae3e6b01b237fc112114b3fbea60d7dd70877c0e
-
Filesize
324KB
MD55b3014597427a15d2fae545fc14856fe
SHA1bd989a0d1a497f79c8ca5bb3a2b73909ab8e49c6
SHA256948d9d8c3f3fc0971f86917d523037a2c48d83e15338ad6555e00297015e494c
SHA5127740d8670550e2fe207e13538bcf0da72d76b3f3a2a6b62b60ed56bd64c1aa470f9e1df8027d0a3ebaa743bbae3e6b01b237fc112114b3fbea60d7dd70877c0e
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7