Analysis
-
max time kernel
94s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 17:30
Behavioral task
behavioral1
Sample
525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe
Resource
win7-20240704-en
General
-
Target
525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe
-
Size
337KB
-
MD5
f4a9e5007dc614b051801e30b8826060
-
SHA1
784664fcf26844ff52f333228b61ee22047969f6
-
SHA256
525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedc
-
SHA512
6934ac1e7073f707a9346654f48b8b74fc935c0948e75a6b6c5005de3ec30627cfd4c2d31ba8d502748bb0cf327ed1d36e41d8c58659ad89d29532041b269930
-
SSDEEP
3072:zSrRNo/76aPG5gYfc0DV+1BIyLK5jZWlfXXqyYwi8x4Yfc09:wR6xO51+fIyG5jZkCwi8r
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ddakjkqi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dddhpjof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Doilmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Daekdooc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dhocqigp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Doilmc32.exe -
Executes dropped EXE 7 IoCs
pid Process 320 Ddakjkqi.exe 1140 Dogogcpo.exe 1132 Daekdooc.exe 1156 Dddhpjof.exe 3568 Dhocqigp.exe 1488 Doilmc32.exe 2280 Dmllipeg.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File created C:\Windows\SysWOW64\Daekdooc.exe Dogogcpo.exe File created C:\Windows\SysWOW64\Elkadb32.dll Dddhpjof.exe File created C:\Windows\SysWOW64\Doilmc32.exe Dhocqigp.exe File opened for modification C:\Windows\SysWOW64\Doilmc32.exe Dhocqigp.exe File created C:\Windows\SysWOW64\Kngpec32.dll Doilmc32.exe File created C:\Windows\SysWOW64\Dogogcpo.exe Ddakjkqi.exe File opened for modification C:\Windows\SysWOW64\Ddakjkqi.exe 525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe File created C:\Windows\SysWOW64\Gifhkeje.dll 525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe File opened for modification C:\Windows\SysWOW64\Dogogcpo.exe Ddakjkqi.exe File created C:\Windows\SysWOW64\Lbabpnmn.dll Ddakjkqi.exe File opened for modification C:\Windows\SysWOW64\Dddhpjof.exe Daekdooc.exe File created C:\Windows\SysWOW64\Dmllipeg.exe Doilmc32.exe File created C:\Windows\SysWOW64\Ddakjkqi.exe 525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe File created C:\Windows\SysWOW64\Ohmoom32.dll Dogogcpo.exe File created C:\Windows\SysWOW64\Dddhpjof.exe Daekdooc.exe File created C:\Windows\SysWOW64\Dhocqigp.exe Dddhpjof.exe File opened for modification C:\Windows\SysWOW64\Dmllipeg.exe Doilmc32.exe File opened for modification C:\Windows\SysWOW64\Daekdooc.exe Dogogcpo.exe File opened for modification C:\Windows\SysWOW64\Dhocqigp.exe Dddhpjof.exe File created C:\Windows\SysWOW64\Diphbb32.dll Dhocqigp.exe File created C:\Windows\SysWOW64\Amjknl32.dll Daekdooc.exe -
Program crash 1 IoCs
pid pid_target Process 5080 2280 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmllipeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ddakjkqi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dogogcpo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Daekdooc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddhpjof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dhocqigp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doilmc32.exe -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ddakjkqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lbabpnmn.dll" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Diphbb32.dll" Dhocqigp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Doilmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kngpec32.dll" Doilmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dhocqigp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ohmoom32.dll" Dogogcpo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dogogcpo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Amjknl32.dll" Daekdooc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dddhpjof.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Gifhkeje.dll" 525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddakjkqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Daekdooc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Elkadb32.dll" Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dddhpjof.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Doilmc32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4748 wrote to memory of 320 4748 525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe 82 PID 4748 wrote to memory of 320 4748 525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe 82 PID 4748 wrote to memory of 320 4748 525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe 82 PID 320 wrote to memory of 1140 320 Ddakjkqi.exe 83 PID 320 wrote to memory of 1140 320 Ddakjkqi.exe 83 PID 320 wrote to memory of 1140 320 Ddakjkqi.exe 83 PID 1140 wrote to memory of 1132 1140 Dogogcpo.exe 84 PID 1140 wrote to memory of 1132 1140 Dogogcpo.exe 84 PID 1140 wrote to memory of 1132 1140 Dogogcpo.exe 84 PID 1132 wrote to memory of 1156 1132 Daekdooc.exe 85 PID 1132 wrote to memory of 1156 1132 Daekdooc.exe 85 PID 1132 wrote to memory of 1156 1132 Daekdooc.exe 85 PID 1156 wrote to memory of 3568 1156 Dddhpjof.exe 86 PID 1156 wrote to memory of 3568 1156 Dddhpjof.exe 86 PID 1156 wrote to memory of 3568 1156 Dddhpjof.exe 86 PID 3568 wrote to memory of 1488 3568 Dhocqigp.exe 87 PID 3568 wrote to memory of 1488 3568 Dhocqigp.exe 87 PID 3568 wrote to memory of 1488 3568 Dhocqigp.exe 87 PID 1488 wrote to memory of 2280 1488 Doilmc32.exe 88 PID 1488 wrote to memory of 2280 1488 Doilmc32.exe 88 PID 1488 wrote to memory of 2280 1488 Doilmc32.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe"C:\Users\Admin\AppData\Local\Temp\525bb1426b662cf4eb45bc2edc4b14880134eb94f7eab39f2d2bce9a3d1bcedcN.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\Ddakjkqi.exeC:\Windows\system32\Ddakjkqi.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\Dogogcpo.exeC:\Windows\system32\Dogogcpo.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\Daekdooc.exeC:\Windows\system32\Daekdooc.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\Dhocqigp.exeC:\Windows\system32\Dhocqigp.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\SysWOW64\Doilmc32.exeC:\Windows\system32\Doilmc32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\Dmllipeg.exeC:\Windows\system32\Dmllipeg.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 3969⤵
- Program crash
PID:5080
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2280 -ip 22801⤵PID:2740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
337KB
MD519c88af5c705c507e8b7f34804b4be7c
SHA1ee3ff20659c08588008cc736721d2b7c70d46331
SHA25612f65115798831412294df3baa5dea970a5be4777ca13ab7ff55040cdd0df724
SHA51214a32e5379a343c5a41f42f9e158d10df1405739e42c53c6c9758220b7416a2ca7ffd13a75905598a33b91f43f0718b6bfdf1c0f2b6dc74285e3653636f3a157
-
Filesize
337KB
MD5a597adbc4bf3d561ec9e7bcdc78af00e
SHA19eaa3825459ed0165743dd54cbc12379b81edbb2
SHA25619c34dbe955aca48f1e6f48698d1b111bd9b3016c71f92d56e65d580b5c69353
SHA512e770e805710d18868f7b348f33abde105ba2117e597bf076a523e4b8cea1037c3ae62ab4538fb119c50c867fee50083afa7acade38c4a760d481007ec64c68f3
-
Filesize
337KB
MD528ab3f81635a54ad8be16231cc6258df
SHA151fcaee1234a06e4593bab9b2b342226a1d9975d
SHA2566608f2f237912dfe93896562d7e709ad7656d31b8d1b438c9a5f0a9d8632e613
SHA5125f38f46f6b2aec831842ff8f8fd905d35dfa9261d5d68a2bf1e9642aeb204e88f2f2d52da8c1ee390e7e079d90025dfa63367525ef75645a92c5796df836c033
-
Filesize
337KB
MD5ac204b3cb96f02b859804cd616693157
SHA1fce4ac325a1b7ddc41ca57c184153d646df64ac0
SHA25699ef4a754f7ccb376012b48469a7c264acb375362f8e71380cb5cbf3c3cdcd02
SHA512803929f5b4efe0f6190deb6bb903641a2e0457208f285b0be5f034e7286a2deb46f9fe94e4814956f94788ce757d98c98a3ee1632d52aad7debeb4d14523cd67
-
Filesize
337KB
MD50f50121fde2bc6b826dfad2083e6cd0c
SHA16d11bd65b134b96bcf8a4c743c4133bee3470629
SHA256a3a4928a6a04ac65863fe4416c306c18b22d108e4a140f0946d3ad4e71a637b2
SHA51286bc941da9bf2ba0385fbbd95ebc62f0ad70612a1dc8e1900c62c0d25a136d7f5f251506ff42e38b6905c7d1dea4fb5e4d62c848c01fabfb627ec76600299cdc
-
Filesize
337KB
MD58e4f44b78b03fe4e363517b71b45344b
SHA1b478eaa642db0326f34f0619f0b2f2a220f74c2a
SHA256cb84b8ba62fd241f428ff30738da2fe4235a6976a757ed4fbaac3fb9cc173614
SHA5122466865266dbc2a52fd46a4bc7e1f71135ea9fa4e05652a74fde551b655cb80faeb67e84fb0cf615461c179991352e6fd8b664bc21abb8ddc7738f37a7fa622a
-
Filesize
337KB
MD57d710d438b8b57f2be704b58c67cb574
SHA1a1f75c09e4bb0d3730132d49bab038f43ff85d26
SHA256d000d029bdc5b72b9cdaca55e2e3159f318a2f1186c539719d7679b17994d52c
SHA5126d332dec437ad3b56ed88275ca572b82242902f4780ffbe1c588c97ff9f1d84a3faa04c68faf152beae8a16cc0b1bb9c953526b31e3cc6d6de4fcd9a2cf943ee