Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
30/08/2023, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
7d08d7acc0fd2f3a88f28590a5707073a403b1ca3acfe91c1b9cd7c080d243bc.exe
Resource
win10-20230703-en
General
-
Target
7d08d7acc0fd2f3a88f28590a5707073a403b1ca3acfe91c1b9cd7c080d243bc.exe
-
Size
705KB
-
MD5
67eb624f740a2e2bbcc3fe7f334bdcef
-
SHA1
079b44ddeb8ee5873bedd4fc04afdee52f0d276a
-
SHA256
7d08d7acc0fd2f3a88f28590a5707073a403b1ca3acfe91c1b9cd7c080d243bc
-
SHA512
2311b7ddb08cf91744745bcd2e68eeea472bcc4adca37fa15f36e8f2fccd8699232dac7a07394c821483aa06c073fce856832163ec064fccb2105039c4d9cf5a
-
SSDEEP
12288:zMrzy90kUASKpSs0Q0ZRAOpZ1dQgVqBbChT9Sq8Zr6SenhZrkWgZQVw:YyFbpxgxZ1dNqtaT9SV6SYhZrk16Vw
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001b009-26.dat healer behavioral1/files/0x000700000001b009-27.dat healer behavioral1/memory/2224-28-0x00000000009F0000-0x00000000009FA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g4614395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g4614395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g4614395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g4614395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g4614395.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 376 x4169704.exe 4780 x5657734.exe 1312 x0245505.exe 2224 g4614395.exe 948 h8299267.exe 3260 saves.exe 1424 i0103738.exe 5072 saves.exe 4148 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 4928 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g4614395.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0245505.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7d08d7acc0fd2f3a88f28590a5707073a403b1ca3acfe91c1b9cd7c080d243bc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4169704.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5657734.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4132 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2224 g4614395.exe 2224 g4614395.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2224 g4614395.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4868 wrote to memory of 376 4868 7d08d7acc0fd2f3a88f28590a5707073a403b1ca3acfe91c1b9cd7c080d243bc.exe 70 PID 4868 wrote to memory of 376 4868 7d08d7acc0fd2f3a88f28590a5707073a403b1ca3acfe91c1b9cd7c080d243bc.exe 70 PID 4868 wrote to memory of 376 4868 7d08d7acc0fd2f3a88f28590a5707073a403b1ca3acfe91c1b9cd7c080d243bc.exe 70 PID 376 wrote to memory of 4780 376 x4169704.exe 71 PID 376 wrote to memory of 4780 376 x4169704.exe 71 PID 376 wrote to memory of 4780 376 x4169704.exe 71 PID 4780 wrote to memory of 1312 4780 x5657734.exe 72 PID 4780 wrote to memory of 1312 4780 x5657734.exe 72 PID 4780 wrote to memory of 1312 4780 x5657734.exe 72 PID 1312 wrote to memory of 2224 1312 x0245505.exe 73 PID 1312 wrote to memory of 2224 1312 x0245505.exe 73 PID 1312 wrote to memory of 948 1312 x0245505.exe 74 PID 1312 wrote to memory of 948 1312 x0245505.exe 74 PID 1312 wrote to memory of 948 1312 x0245505.exe 74 PID 948 wrote to memory of 3260 948 h8299267.exe 75 PID 948 wrote to memory of 3260 948 h8299267.exe 75 PID 948 wrote to memory of 3260 948 h8299267.exe 75 PID 4780 wrote to memory of 1424 4780 x5657734.exe 76 PID 4780 wrote to memory of 1424 4780 x5657734.exe 76 PID 4780 wrote to memory of 1424 4780 x5657734.exe 76 PID 3260 wrote to memory of 4132 3260 saves.exe 77 PID 3260 wrote to memory of 4132 3260 saves.exe 77 PID 3260 wrote to memory of 4132 3260 saves.exe 77 PID 3260 wrote to memory of 1868 3260 saves.exe 78 PID 3260 wrote to memory of 1868 3260 saves.exe 78 PID 3260 wrote to memory of 1868 3260 saves.exe 78 PID 1868 wrote to memory of 4964 1868 cmd.exe 81 PID 1868 wrote to memory of 4964 1868 cmd.exe 81 PID 1868 wrote to memory of 4964 1868 cmd.exe 81 PID 1868 wrote to memory of 4808 1868 cmd.exe 82 PID 1868 wrote to memory of 4808 1868 cmd.exe 82 PID 1868 wrote to memory of 4808 1868 cmd.exe 82 PID 1868 wrote to memory of 4484 1868 cmd.exe 83 PID 1868 wrote to memory of 4484 1868 cmd.exe 83 PID 1868 wrote to memory of 4484 1868 cmd.exe 83 PID 1868 wrote to memory of 4996 1868 cmd.exe 84 PID 1868 wrote to memory of 4996 1868 cmd.exe 84 PID 1868 wrote to memory of 4996 1868 cmd.exe 84 PID 1868 wrote to memory of 3896 1868 cmd.exe 85 PID 1868 wrote to memory of 3896 1868 cmd.exe 85 PID 1868 wrote to memory of 3896 1868 cmd.exe 85 PID 1868 wrote to memory of 5048 1868 cmd.exe 86 PID 1868 wrote to memory of 5048 1868 cmd.exe 86 PID 1868 wrote to memory of 5048 1868 cmd.exe 86 PID 3260 wrote to memory of 4928 3260 saves.exe 88 PID 3260 wrote to memory of 4928 3260 saves.exe 88 PID 3260 wrote to memory of 4928 3260 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d08d7acc0fd2f3a88f28590a5707073a403b1ca3acfe91c1b9cd7c080d243bc.exe"C:\Users\Admin\AppData\Local\Temp\7d08d7acc0fd2f3a88f28590a5707073a403b1ca3acfe91c1b9cd7c080d243bc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4169704.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4169704.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5657734.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5657734.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0245505.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0245505.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4614395.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4614395.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8299267.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8299267.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4132
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4964
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4808
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4996
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:5048
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4928
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0103738.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i0103738.exe4⤵
- Executes dropped EXE
PID:1424
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:5072
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4148
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD577a039572a6ff60df0094016570f1200
SHA1a113486d40cc632135b38792b8e2934c1b196b72
SHA256a47dfa226e2c510849711807d5cfb94ae4f434b2c379df630200010bc8b2e76e
SHA5129362910ace95fde204012bac3b13b57bbc7ff16b383e2ceb24c378c9ac6484431cb85b5f583a83f390d98e66719f99a44f3696ca591cd503fa161ee4ae01bdc8
-
Filesize
599KB
MD577a039572a6ff60df0094016570f1200
SHA1a113486d40cc632135b38792b8e2934c1b196b72
SHA256a47dfa226e2c510849711807d5cfb94ae4f434b2c379df630200010bc8b2e76e
SHA5129362910ace95fde204012bac3b13b57bbc7ff16b383e2ceb24c378c9ac6484431cb85b5f583a83f390d98e66719f99a44f3696ca591cd503fa161ee4ae01bdc8
-
Filesize
433KB
MD57fb244b11f6f4be764e5a211c716c8a0
SHA1b6a69fa9c6522466a68a78db0ca31854b92a14bf
SHA256d77c0259e1a402edf306684d1dba48e4aa1ff992aec89ff69c5f086dfb328007
SHA512767bf6548853827b66b5ebc955f53529fae85d03873d2508393e7e6a15486bd31b9dce0f73efe269fc6d2fff85f12278b1927d7d69c41f3652b960cac0193042
-
Filesize
433KB
MD57fb244b11f6f4be764e5a211c716c8a0
SHA1b6a69fa9c6522466a68a78db0ca31854b92a14bf
SHA256d77c0259e1a402edf306684d1dba48e4aa1ff992aec89ff69c5f086dfb328007
SHA512767bf6548853827b66b5ebc955f53529fae85d03873d2508393e7e6a15486bd31b9dce0f73efe269fc6d2fff85f12278b1927d7d69c41f3652b960cac0193042
-
Filesize
174KB
MD5b4d971e9bde316efa912a9685f82eda8
SHA1e4dde795b0a714f1e711de93a728ed9406440a81
SHA256e83b51ef642a9fc566961e540782c2c3ad96d66d14bb57d733deb38681475338
SHA512b0d4f7f317587dbdca2e71b395d1222ead43eda19da692a997860f5664de8788c536f960563ca40517be2039bad39a480f0d37489845d76d7ae9869115004c99
-
Filesize
174KB
MD5b4d971e9bde316efa912a9685f82eda8
SHA1e4dde795b0a714f1e711de93a728ed9406440a81
SHA256e83b51ef642a9fc566961e540782c2c3ad96d66d14bb57d733deb38681475338
SHA512b0d4f7f317587dbdca2e71b395d1222ead43eda19da692a997860f5664de8788c536f960563ca40517be2039bad39a480f0d37489845d76d7ae9869115004c99
-
Filesize
277KB
MD5bd3896a08d45fd0b7bfa455c08a84862
SHA1a9d5ac243f0af4ede18ab779c8b2c6a56b65f201
SHA25696bdae407bfecbf8d66d023bac0016004242212f6840e3f9abdb6879b6b0cd64
SHA512843d692fa10f54b3d5e4ebea012cfd46622522294b5c4777a1fe4069139e412459b1c77e962b68a9c23c1d591235124213cf7ee8d77aeb60b3776d5632e365d1
-
Filesize
277KB
MD5bd3896a08d45fd0b7bfa455c08a84862
SHA1a9d5ac243f0af4ede18ab779c8b2c6a56b65f201
SHA25696bdae407bfecbf8d66d023bac0016004242212f6840e3f9abdb6879b6b0cd64
SHA512843d692fa10f54b3d5e4ebea012cfd46622522294b5c4777a1fe4069139e412459b1c77e962b68a9c23c1d591235124213cf7ee8d77aeb60b3776d5632e365d1
-
Filesize
17KB
MD57e99a458101e5fe900811e0c2a37e0cc
SHA15cec449ab8ef65373602b5b298fdc2ca4570d961
SHA256ec93e6ab9f5ebb52d3d45940905bdbd49a2e57987d8978d430929e7c6821dc1f
SHA512703625409cb92a11b7f012091beafc8ee2b6b5f3da7bec0b4fd25c6bc9e5c9ff2d492c151ce411f72606fe8cc04282b9c8b9924f10346a9057b1a4094041751c
-
Filesize
17KB
MD57e99a458101e5fe900811e0c2a37e0cc
SHA15cec449ab8ef65373602b5b298fdc2ca4570d961
SHA256ec93e6ab9f5ebb52d3d45940905bdbd49a2e57987d8978d430929e7c6821dc1f
SHA512703625409cb92a11b7f012091beafc8ee2b6b5f3da7bec0b4fd25c6bc9e5c9ff2d492c151ce411f72606fe8cc04282b9c8b9924f10346a9057b1a4094041751c
-
Filesize
326KB
MD5c9a97ab18a9fd42f77ef6ced8c2c1bb1
SHA1001d7e41ff9ade73cad2328fb5bb981200e05f86
SHA256000b4a3e5e86745a170e9e69410ea3422b4736d4e666e41a322107bc4ac07c13
SHA512a871c9c82fe319544401b42ea1ab79e03e2a4dd00b28fd7d9cada27b93e70f15732b6bc18884c2fed5eeb70d467813fa303361d48ffbcd0710b8da29128f3fbc
-
Filesize
326KB
MD5c9a97ab18a9fd42f77ef6ced8c2c1bb1
SHA1001d7e41ff9ade73cad2328fb5bb981200e05f86
SHA256000b4a3e5e86745a170e9e69410ea3422b4736d4e666e41a322107bc4ac07c13
SHA512a871c9c82fe319544401b42ea1ab79e03e2a4dd00b28fd7d9cada27b93e70f15732b6bc18884c2fed5eeb70d467813fa303361d48ffbcd0710b8da29128f3fbc
-
Filesize
326KB
MD5c9a97ab18a9fd42f77ef6ced8c2c1bb1
SHA1001d7e41ff9ade73cad2328fb5bb981200e05f86
SHA256000b4a3e5e86745a170e9e69410ea3422b4736d4e666e41a322107bc4ac07c13
SHA512a871c9c82fe319544401b42ea1ab79e03e2a4dd00b28fd7d9cada27b93e70f15732b6bc18884c2fed5eeb70d467813fa303361d48ffbcd0710b8da29128f3fbc
-
Filesize
326KB
MD5c9a97ab18a9fd42f77ef6ced8c2c1bb1
SHA1001d7e41ff9ade73cad2328fb5bb981200e05f86
SHA256000b4a3e5e86745a170e9e69410ea3422b4736d4e666e41a322107bc4ac07c13
SHA512a871c9c82fe319544401b42ea1ab79e03e2a4dd00b28fd7d9cada27b93e70f15732b6bc18884c2fed5eeb70d467813fa303361d48ffbcd0710b8da29128f3fbc
-
Filesize
326KB
MD5c9a97ab18a9fd42f77ef6ced8c2c1bb1
SHA1001d7e41ff9ade73cad2328fb5bb981200e05f86
SHA256000b4a3e5e86745a170e9e69410ea3422b4736d4e666e41a322107bc4ac07c13
SHA512a871c9c82fe319544401b42ea1ab79e03e2a4dd00b28fd7d9cada27b93e70f15732b6bc18884c2fed5eeb70d467813fa303361d48ffbcd0710b8da29128f3fbc
-
Filesize
326KB
MD5c9a97ab18a9fd42f77ef6ced8c2c1bb1
SHA1001d7e41ff9ade73cad2328fb5bb981200e05f86
SHA256000b4a3e5e86745a170e9e69410ea3422b4736d4e666e41a322107bc4ac07c13
SHA512a871c9c82fe319544401b42ea1ab79e03e2a4dd00b28fd7d9cada27b93e70f15732b6bc18884c2fed5eeb70d467813fa303361d48ffbcd0710b8da29128f3fbc
-
Filesize
326KB
MD5c9a97ab18a9fd42f77ef6ced8c2c1bb1
SHA1001d7e41ff9ade73cad2328fb5bb981200e05f86
SHA256000b4a3e5e86745a170e9e69410ea3422b4736d4e666e41a322107bc4ac07c13
SHA512a871c9c82fe319544401b42ea1ab79e03e2a4dd00b28fd7d9cada27b93e70f15732b6bc18884c2fed5eeb70d467813fa303361d48ffbcd0710b8da29128f3fbc
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b