Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-05-2024 17:20
Static task
static1
Behavioral task
behavioral1
Sample
2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe
Resource
win10v2004-20240508-en
General
-
Target
2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe
-
Size
1.8MB
-
MD5
a545015277adb79890693c2aa95bd1ad
-
SHA1
64d174ec5dedfc9e25887213221fb171707ef8a7
-
SHA256
2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205
-
SHA512
560e9f3bc48a8e40133336f320feb22774c0da73c6947af4a159b881086ab07d60326f63c4cd41041fee23b9223188243ce1a121cdb200751ef068bf9499eb37
-
SSDEEP
49152:ZpvNociR3yxx1JLSYwy9AdBVoHwVC5Sm2EfR/kCN:dOgDhSThxkFDS
Malware Config
Extracted
amadey
4.20
http://5.42.96.141
http://5.42.96.7
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
Processes:
explorku.exeamers.exeaxplons.exeaxplons.exeexplorku.exe2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exeexplorku.exeaxplons.exeexplorku.exef2e3cbf6ad.exeexplorku.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amers.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f2e3cbf6ad.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
axplons.exeexplorku.exef2e3cbf6ad.exeaxplons.exe2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exeexplorku.exeamers.exeexplorku.exeaxplons.exeexplorku.exeexplorku.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f2e3cbf6ad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f2e3cbf6ad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amers.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amers.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe -
Executes dropped EXE 11 IoCs
Processes:
explorku.exeexplorku.exeamers.exeaxplons.exeexplorku.exef2e3cbf6ad.exeinstaller.exeaxplons.exeexplorku.exeaxplons.exeexplorku.exepid Process 2728 explorku.exe 4264 explorku.exe 1080 amers.exe 4908 axplons.exe 3432 explorku.exe 1072 f2e3cbf6ad.exe 4992 installer.exe 4732 axplons.exe 3972 explorku.exe 3912 axplons.exe 3928 explorku.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
explorku.exeaxplons.exeexplorku.exeaxplons.exe2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exeexplorku.exeamers.exeaxplons.exeexplorku.exeexplorku.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine explorku.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine explorku.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine explorku.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine amers.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine explorku.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine explorku.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/files/0x000100000002a9d7-100.dat themida behavioral2/memory/1072-114-0x00000000004B0000-0x0000000000B29000-memory.dmp themida behavioral2/memory/1072-115-0x00000000004B0000-0x0000000000B29000-memory.dmp themida behavioral2/memory/1072-118-0x00000000004B0000-0x0000000000B29000-memory.dmp themida behavioral2/memory/1072-116-0x00000000004B0000-0x0000000000B29000-memory.dmp themida behavioral2/memory/1072-117-0x00000000004B0000-0x0000000000B29000-memory.dmp themida behavioral2/memory/1072-119-0x00000000004B0000-0x0000000000B29000-memory.dmp themida behavioral2/memory/1072-122-0x00000000004B0000-0x0000000000B29000-memory.dmp themida behavioral2/memory/1072-121-0x00000000004B0000-0x0000000000B29000-memory.dmp themida behavioral2/memory/1072-120-0x00000000004B0000-0x0000000000B29000-memory.dmp themida behavioral2/memory/1072-157-0x00000000004B0000-0x0000000000B29000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorku.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Windows\CurrentVersion\Run\f2e3cbf6ad.exe = "C:\\Users\\Admin\\1000006002\\f2e3cbf6ad.exe" explorku.exe Set value (str) \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Windows\CurrentVersion\Run\installer.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000011001\\installer.exe" explorku.exe -
Processes:
f2e3cbf6ad.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f2e3cbf6ad.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
Processes:
2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exeexplorku.exeexplorku.exeamers.exeaxplons.exeexplorku.exeaxplons.exeexplorku.exeaxplons.exeexplorku.exepid Process 2404 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe 2728 explorku.exe 4264 explorku.exe 1080 amers.exe 4908 axplons.exe 3432 explorku.exe 4732 axplons.exe 3972 explorku.exe 3912 axplons.exe 3928 explorku.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
explorku.exedescription pid Process procid_target PID 2728 set thread context of 4264 2728 explorku.exe 83 -
Drops file in Windows directory 2 IoCs
Processes:
2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exeamers.exedescription ioc Process File created C:\Windows\Tasks\explorku.job 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe File created C:\Windows\Tasks\axplons.job amers.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exeexplorku.exeexplorku.exeamers.exeaxplons.exeexplorku.exeinstaller.exeaxplons.exeexplorku.exeaxplons.exeexplorku.exepid Process 2404 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe 2404 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe 2728 explorku.exe 2728 explorku.exe 4264 explorku.exe 4264 explorku.exe 1080 amers.exe 1080 amers.exe 4908 axplons.exe 4908 axplons.exe 3432 explorku.exe 3432 explorku.exe 4992 installer.exe 4992 installer.exe 4732 axplons.exe 4732 axplons.exe 3972 explorku.exe 3972 explorku.exe 3912 axplons.exe 3912 axplons.exe 3928 explorku.exe 3928 explorku.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
installer.exedescription pid Process Token: SeDebugPrivilege 4992 installer.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exeexplorku.exeamers.exedescription pid Process procid_target PID 2404 wrote to memory of 2728 2404 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe 82 PID 2404 wrote to memory of 2728 2404 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe 82 PID 2404 wrote to memory of 2728 2404 2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe 82 PID 2728 wrote to memory of 4264 2728 explorku.exe 83 PID 2728 wrote to memory of 4264 2728 explorku.exe 83 PID 2728 wrote to memory of 4264 2728 explorku.exe 83 PID 2728 wrote to memory of 4264 2728 explorku.exe 83 PID 2728 wrote to memory of 4264 2728 explorku.exe 83 PID 2728 wrote to memory of 4264 2728 explorku.exe 83 PID 2728 wrote to memory of 4264 2728 explorku.exe 83 PID 2728 wrote to memory of 4264 2728 explorku.exe 83 PID 2728 wrote to memory of 4264 2728 explorku.exe 83 PID 2728 wrote to memory of 4264 2728 explorku.exe 83 PID 2728 wrote to memory of 4264 2728 explorku.exe 83 PID 2728 wrote to memory of 4264 2728 explorku.exe 83 PID 2728 wrote to memory of 1080 2728 explorku.exe 84 PID 2728 wrote to memory of 1080 2728 explorku.exe 84 PID 2728 wrote to memory of 1080 2728 explorku.exe 84 PID 1080 wrote to memory of 4908 1080 amers.exe 85 PID 1080 wrote to memory of 4908 1080 amers.exe 85 PID 1080 wrote to memory of 4908 1080 amers.exe 85 PID 2728 wrote to memory of 1072 2728 explorku.exe 87 PID 2728 wrote to memory of 1072 2728 explorku.exe 87 PID 2728 wrote to memory of 1072 2728 explorku.exe 87 PID 2728 wrote to memory of 4992 2728 explorku.exe 88 PID 2728 wrote to memory of 4992 2728 explorku.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe"C:\Users\Admin\AppData\Local\Temp\2048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\amers.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\amers.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
-
C:\Users\Admin\1000006002\f2e3cbf6ad.exe"C:\Users\Admin\1000006002\f2e3cbf6ad.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\1000011001\installer.exe"C:\Users\Admin\AppData\Local\Temp\1000011001\installer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3432
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5ba7a6e2153260b9b3acc44afc052354a
SHA18c3c64aceb59f36d4cae124961c71b1dd7e7e8de
SHA256b1dc825eb3cb0d4cb5a09168d33df436ed151f29eef926c274c9a7cf1b8bb6a3
SHA51234f3b507c9ae5e2307c07c2227fd813e50684734077f6e0b1b72db27a64877f2266296f7e6898efedb0ef3baaf2c09e8d11529169573146460da15c6768e81be
-
Filesize
1.8MB
MD528c474451853446abe7971cf9d2c4b4c
SHA17cb24e9633034b04ef8bd294c5df2240259c28c5
SHA2567ae609ce947e005ddfd6bba4505a5cd5ec897e8bf55d304e2d8a56fa961f545d
SHA5123dbdb4d8edd84a31633f6e613f61c4636f41ba306dc9a3b2febdedfa9b3dfe61c6d13514ba9daf1ae619b4f3444ecc10ed4138fb0480f9839083996aa0f93c38
-
Filesize
621KB
MD5611a4246c5aabf1594344d7bd3fccb4c
SHA1cf0e6b3ecb479a8bdb7421090ecc89148db9f83b
SHA256aa34e0bb1a7400fd7430922307c36441290730d07f48f982f01d4bad2fde3d0e
SHA5120daff7de219bcc38ddc8ddf261993b6e870605fbf6ec194e08651b293008a8a42c0c13780482f7fc45e3a5f509b644430311cb382be632075544e61dc63fe23e
-
Filesize
1.8MB
MD5a545015277adb79890693c2aa95bd1ad
SHA164d174ec5dedfc9e25887213221fb171707ef8a7
SHA2562048bcca69c7a5f69d1b2fc41ab46116de52fc22e3d165ecd98c37f97d727205
SHA512560e9f3bc48a8e40133336f320feb22774c0da73c6947af4a159b881086ab07d60326f63c4cd41041fee23b9223188243ce1a121cdb200751ef068bf9499eb37
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82