Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 07:01

General

  • Target

    megre.exe

  • Size

    4.3MB

  • MD5

    85dceadb1bd64dbfa1ae239cb92c21a9

  • SHA1

    f71b846525a41c474769a0e7e12a526b9352f0cc

  • SHA256

    1ecd797d5056faf5829c5e29538e898b76a6f0e0716d0a6a0ccde0b287450b2f

  • SHA512

    19238aa72a123d72263db531c4e84ee7035f411ce6a4f7ca763170c2f37df4f4c79b7caf299d47f4ebd3f782f3e2f1f61412060d362c6a5eb6d2dd846340ae8c

  • SSDEEP

    98304:pInwwYFiFsL5JSgwY2bb+YIqdhMnaKrvBFyQQez:pUwwsL/SSE6YbMJJwQQez

Score
10/10

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1256088784949215303/WbNGmjP1oWYHf73DLWcGmirMGggTyKkhmk7TEi81oeSTOQ3ZMo631rf3-QXvJw6dp6pf

Signatures

  • Skuld stealer

    An info stealer written in Go lang.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\megre.exe
    "C:\Users\Admin\AppData\Local\Temp\megre.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\cracker.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "start /min "" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe""
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2964
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe"
          4⤵
          • Executes dropped EXE
          PID:2752
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "start /min "" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\wompwomp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\RarSFX0\wompwomp.bat"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2544
          • C:\Windows\SysWOW64\cscript.exe
            cscript /nologo /e:jscript "C:\Users\Admin\AppData\Local\Temp\RarSFX0\wompwomp.bat"
            5⤵
              PID:1328
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "start /min "" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\website.bat""
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2812
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\RarSFX0\website.bat"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2864
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe" https://www.youtube.com/watch?v=fboNTcjJ8bo
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2328
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:2
                6⤵
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:2860
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "start /min "" java -jar "C:\Users\Admin\AppData\Local\Temp\RarSFX0\iidk.jar""
          3⤵
            PID:1128
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c "start /min "" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\taskkiller.bat""
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2708
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\RarSFX0\taskkiller.bat"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2888
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /im cmd.exe /f
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1760

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        67548dace0d07de0e1987504fd386c9b

        SHA1

        faedfb14b3b8568f9675fd005a270b0d3f664cbf

        SHA256

        7d4bb5a672f7a797448e750b70e5c5780c40dda8736737546294bb8953d74b56

        SHA512

        2bc0e6ccb01a16b586e1ec12641d696f258673bbc07c6df74aad4db2cce7b4cdc3db299dfa459a4217ec0528db7d1307b33dc011a345136c1ba29ada311edda7

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        a41fa842663cc7ac1269366029a082ee

        SHA1

        4f9f73de027e188bcce79e161cca9bda4c17ddbb

        SHA256

        a406e3d149ad76dd7f3967d1674f6b79c139df12f946c15774f0907b77bd4b6f

        SHA512

        ac1d9598a26e3ac770abaa754d59b3996bba5bc32d66a0a0727010ef5d4925ad31f50fa3b7a636a23e9d8ffadb3247560b51dc337af4228bcc07c21df2990766

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        03e052c1bc90f28616e2251693ebd7ce

        SHA1

        d6abe393038ddd9ac04a6a4b87f6a5956c4376db

        SHA256

        e8b4335460995427b32577faa57d3a4c69f908180b204ec3bd409db2c24db2f7

        SHA512

        739d4b90e8115b07878089cf101d419888718b907f39dad5322765318527a2e1490d08b9996cb0dba8ed2b07fb588b93ff63af06ac62285237227b7fa788ead9

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        65dcc5ee0fcd9c1667dc72e63a234633

        SHA1

        421bfb9ea5e00173e149605843b88ea29580b415

        SHA256

        eae74cc8841ca26aa46f13c60c8da9b5b19954df3b0d49d0a1b9da30325aa1d0

        SHA512

        2ea16d9f6451a42410175c82fc5e394d6986185723cfe0793ccc2e4d1101f5757b71492400571e98e1afef2b2d4b9468d624c7f6ceeff558ac12581e309ef9a3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        bb526200a184d1a9e7673160d9318782

        SHA1

        d3bae5f79bac142d6db6c0637fda6f84fe307b74

        SHA256

        8a7fc203b7e05f50f7d06d9420c4c095c0d81af7c7e0b70d718594e9cb9d0075

        SHA512

        3bf01dc9904579a5f86a36af97f84f91ef0b9bd05957643df44a566bf22d9cd650fc978d4e860f2163e530ab9de363476ed3203b83d7eea175b6559c1fcf4a2e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        b19826d1244117c0926bef0cc3ee7efa

        SHA1

        98171d668828e3ac23467c25ae7e76a2638dd862

        SHA256

        552843c95660621c090dddbf56f46d9957460886c91799da1f418bbe26982fad

        SHA512

        97fb9f40b1283894a000d16ae487efd05fb4f8c305e2dbbae5afc1f575d42092de58d13457135fd5160447e079c4588364e56d17a7ddf3bc4a00b5a9ffcc63ca

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        625425ba714f37fc6b318e4e740d62c3

        SHA1

        69ac1bc58b7fae2ce8210a0d05914859c4b32ca9

        SHA256

        092b81f3973bceabe635ef8e2ec7b94dcb8e9f9c37ef8aa4ce43e8da9c296cc6

        SHA512

        f5440a3922eb2e5eace6fe5aa6b6885e74891b546bfd5d4b2017918f68c42ece8c3475174a7ed3a5b09d49ffb878840fb22785cca1f74b5c7f3c1d1b36c57f2b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        a95bd5558e1ea99437214b6d25d19435

        SHA1

        2d87ac41b259b83acd6ef6c099bd50920a6910c3

        SHA256

        6438668b328b34e7335ac581e9c7825ea55ab131d28b9680bbe30a2aab8b1f5d

        SHA512

        19c912eb71de51f273c4004afc0de7ce33c98cddbfbb4ef0189e9cb91459eea0e1dfb478799f3edab4c99fca5f5f22f7e03a9534d2521f974600812b01a0a80e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        b04855217e5b283633b50d97232b25d5

        SHA1

        112de55c3946760d35d83c78744b0634c5d78914

        SHA256

        9453fb31e0dec058e90c6900cb0549de62ad449c9a32066770858a53ef4d4638

        SHA512

        c0e64d0f53526af93c3c85cf2af227ea9cc771ea31d145de8482083eaade6bef5039375034104182f808821fff40112cbd68968baf01b496c126db4c857d8e5c

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        5a96c253218eb694c56f6feb62c5675d

        SHA1

        b09e9be942a3f493762fe569d13168690f307b28

        SHA256

        2799eb3a43f0cc3d7249104a008149f95fcd0ff598f33cf52161429bf7f1e9dc

        SHA512

        aee6564a21fb26930bb914fb92491d12367fddc77688aad003d855314d7297f1952d3f370923db36009a773aa299e4dd74a1719035949ef475951cf73ef32a93

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        1bf36ebe26d7c93ac53c8c4e831936fe

        SHA1

        ab7c8ff5c9a9aa9c508f184bc8ab4f1929171b95

        SHA256

        c8608d3fc952f5af3ff4ef9843b8f0f6060b02571f80886abb47e5d3b748229a

        SHA512

        1b0bfda65eedd2440e38aa7a2e775ce329fc73efdcd17b40b57ab64784773ef5ea87b9b64c8b70e3c0c47c3149d235a818d5432bbc8471362aa6db16471ef271

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        87a36077a18c619c94caa08be8577ad0

        SHA1

        20689745ead1df235d7602af075d9cf06013112d

        SHA256

        e60c239a1a0bb1eea2d78bb9ecf1c2f0849fc82e64c882989a9c1d75b917db2a

        SHA512

        af65c4b1ea9912dc2661d656f9cd969df3f3b42ceb96ef41a0907de6c4a03f190e3d0cd57e51ce869345434e34e0ad414aadb3319896d5b49f2b23f7a5b12d8b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        3c418aa5993ae7d69b92de0ebb762618

        SHA1

        c20719c01a2535c224ffddc251f44a8468a20f9a

        SHA256

        2e8dc1478231928cdf18a6dac6ab83cd93317199d805a9718abe16a4f050b77d

        SHA512

        2f5a821f359b70057a7f4d8777fb5483494e7fdd6420ebcc25914c8101d4c7d91f5f723da36bc320086b6a90124dcbe50999688d7344dc5a8205644a8798b5d5

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        5962ff555977a212244c5bbdc87f8656

        SHA1

        4a8aa0b859ef4f39e0f2a95baaac663478287e5d

        SHA256

        d4a186b4241403718d9a8b8da81672aab692fdb985beaf8b3a6018b4f85ffa22

        SHA512

        b604afb9c0f315cc9889f4ee2a75a397a63e14addf5a08067f22d623c4d2db8e81d617e93074b54e06e3abfd435a653f1b82721ce0adaa38b0ab251596b7a0cd

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        77dd7fdc7ff1b69fc4556c352fe87d6e

        SHA1

        180b23ea99782cd64daa60c402b0fca5ed66fe81

        SHA256

        bc0375c8c296dc819c14e0457576bc119a752185b9802c90c0f4189a52e5101b

        SHA512

        eddb1b1c5b59164e6e1d12a6032e5e97148700cf9bdeeebffe8908b8c50e9a5edbe74ad387f3053ec582624d6632375bde86178ddb4ef3137b67314355329202

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        41294f932c1f4335ad556a8747eb1538

        SHA1

        0a58d91e1778db398551a36cf9979b452e6f0119

        SHA256

        092cccf438398ba9feb991344f95606a006561e1eea879afaeaad9ae3e753636

        SHA512

        4f036cfbe51565dd4fe6225d2874a70e2ee4a41b288c6c751a9799880038c3d710c742be90d6e45e8efc86f5cbbb5f28e989a5ffd9f4137eabd5f5cf011e8ada

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        427909f2a8491313060b925bdf0c95f8

        SHA1

        febf65a7070c4b779d7b0fc985defbc944dc8bee

        SHA256

        648b61f7c22b3c67c0356c70b3a47a6cf2913fbc1f35724f0933f3bd951865a4

        SHA512

        703e3adf2bec465637c63029fe68bce417e5d607145deee6cb404c6aa5444b594445162f34a9a60419ff553f8f7869d0e0ce023bab3c184da53304ba6c1d5324

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        6a8ab1754b1feae93de278e90412d5f2

        SHA1

        0fff583a79ea052ede889518f72588945c7f42e0

        SHA256

        b8e93fa3542091a5224dc1242d95f3fb90f9f9f62eb5582a65ee1c74c53f8c3c

        SHA512

        f932bb253448c3c1d17de8c552d096a12336d1d1b9541e52ed52501099f13491affd772d2ab088092b3c9ee8b609bc855f9845ac0d342fed95efe857f689462d

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e958b118f3fa4b2fabe4f8966ca4e0a6

        SHA1

        669529d88d711cfa9995559624c3b4ad9f4eebb2

        SHA256

        622ca1855108ce583c7223470574b2714fcbe520b6091241ac3582bc81d70a14

        SHA512

        9a91f8ecc8c4d54f8014ac2dfff9c2ec8e9bb1b015b27cc82a8fece195529e36bf9d4fe17f2bf0c61876afa6a00baa29445ed4caeb6cc5e575dba076cf800139

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        6ac3172a6fff53b7d1fe5d7553230089

        SHA1

        35bc407c3e67046a3c6d768064d98b7c9ebefcaa

        SHA256

        e21e1c53d7a4d38b095caf0c66e3cee525cd5e7bddd0624a62c74fd4319ce79f

        SHA512

        4cf78e0d5ffbf3397aa31f33d5e3c7ea9f3f9b7c6b6a86819a7a04e3535cf1b8f2ea5a2ad7af0fcfc1c261c243a325fab2adb4d5b10756ceb823dd5407dab2ca

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\9yhbznx\imagestore.dat

        Filesize

        1KB

        MD5

        78e97f0dc3b7d204094a0cd6c9645932

        SHA1

        73d08fc429a8456c92eeb4c2e67e9d28c16a80c4

        SHA256

        a3be103dabd888b67bdd8858d9f06c586f9f003d7cbf66ec242afed624024418

        SHA512

        c92712c8767e95e335654ba434617377e607fcbd83634e81942678b3b605392a5afab07cdf0e56e2cb051225aee29a796b6b97a067a8d24fbb16a794ee7ff25d

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TNPG4FQ8\favicon[1].ico

        Filesize

        1KB

        MD5

        f2a495d85735b9a0ac65deb19c129985

        SHA1

        f2e22853e5da3e1017d5e1e319eeefe4f622e8c8

        SHA256

        8bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d

        SHA512

        6ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b

      • C:\Users\Admin\AppData\Local\Temp\Cab2D58.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cracker.bat

        Filesize

        563B

        MD5

        76c3d1865f41ab708d1e2accf999d3c8

        SHA1

        9502f0b7e4387a1facbc30ef0cc5915cd15da126

        SHA256

        d23dd8777f83432b7583ab2e41b07dd5406b114bd3bd50eaf8a841476099bd43

        SHA512

        cd800c73ec7cd61df4e4f7613af05aa067b7c07fd4bf1cbdc3e978887a1106e0d849d02b42d5d231049af62625ed39029a95197d1daa976672f20831f4ae7a78

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\skuld.exe

        Filesize

        9.5MB

        MD5

        22216d85e929d3537d5e0c323e0e88db

        SHA1

        72e75f35acfa36dc3e28c16ecfcca46f335c7d74

        SHA256

        f06335e29583075184a183ab4346b02966d85ea83c63197cf59ee8b1dd72a149

        SHA512

        319e14b6b24707530ecf1cae601f14b8b5ff3a36a4aa8509c100b7b157fa58e4936457d6306e6bb70a1993fdfc2ca8763f754058498c8ebdddf84fd8aaf7999b

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\taskkiller.bat

        Filesize

        54B

        MD5

        18ef03e1045b224a70d9afdf8247a241

        SHA1

        117b3959ded227b5cf0015229db0386f6479df70

        SHA256

        daf87ae302bcd7c7a65f6db2b93216116de0621169f724f564812a6a8614f33d

        SHA512

        2ef552283ed844801dc6b7a2ec143e1e52f77b6f7ee2516bb70b3c8db6592eaef9e435f063bbb94019ac135c2e37ccfcb9db8f926a7358c3590b3fc9c63beafd

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\website.bat

        Filesize

        74B

        MD5

        b3be17a14609d812602af67da8b7acc2

        SHA1

        e1fcc3e3989ee6846694eba252622a336ce63795

        SHA256

        f6cb1a4b508b1650cc1eaa607f545e50967157eef4f676de39836f2806d63b81

        SHA512

        780a624a79bb3b293d83017595f709dd9fdc9e645f9c8bc5102aacaaad89a622e6a0dae9ea30fc3679378f6fe4afe34937f4909594c32351ee831917e8b0c1a7

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\wompwomp.bat

        Filesize

        340B

        MD5

        6943c2eb7e78b8b8cb8171b940de20f2

        SHA1

        e428c6dc0ffc17ab70178765e0bcb23dc0c12b8a

        SHA256

        eb79d4bf846dfbd540085f0972658373f26709f281dfb88ad461f9df03d83095

        SHA512

        1d628f3c5ac6e41ed14cc0069bde0278248e32c77e2e111bc842a71ba62d52913b47fb29402ce79b3d0880b6b5763b0d9906d6fb65bcfdf33103aefa0044552b

      • C:\Users\Admin\AppData\Local\Temp\Tar2D5B.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b