Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434N.exe
Resource
win10v2004-20241007-en
General
-
Target
0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434N.exe
-
Size
929KB
-
MD5
54444247521730c54b0dfc08099bf7c0
-
SHA1
e1a4bea1866c74b906c06f5b81d7b49aea907b0f
-
SHA256
0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434
-
SHA512
a535a05f2281b87c9e6e64bcef7b9eb536f6fa79992df594795e1350a2be12beab6f4f40efa32b075cb2526a30c57033c623878c9b0cecd7b01ab268481f8b60
-
SSDEEP
24576:dyeHF/hVltc4V3lToBThCzHSr5A6Fj18bgfk:4el/hNj3poBTCAXjKU
Malware Config
Extracted
amadey
3.80
9c0adb
http://193.3.19.154
-
install_dir
cb7ae701b3
-
install_file
oneetx.exe
-
strings_key
23b27c80db2465a8e1dc15491b69b82f
-
url_paths
/store/games/index.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4736-21-0x0000000000900000-0x000000000091A000-memory.dmp healer behavioral1/memory/4736-23-0x0000000002350000-0x0000000002368000-memory.dmp healer behavioral1/memory/4736-24-0x0000000002350000-0x0000000002363000-memory.dmp healer behavioral1/memory/4736-41-0x0000000002350000-0x0000000002363000-memory.dmp healer behavioral1/memory/4736-51-0x0000000002350000-0x0000000002363000-memory.dmp healer behavioral1/memory/4736-49-0x0000000002350000-0x0000000002363000-memory.dmp healer behavioral1/memory/4736-47-0x0000000002350000-0x0000000002363000-memory.dmp healer behavioral1/memory/4736-45-0x0000000002350000-0x0000000002363000-memory.dmp healer behavioral1/memory/4736-43-0x0000000002350000-0x0000000002363000-memory.dmp healer behavioral1/memory/4736-39-0x0000000002350000-0x0000000002363000-memory.dmp healer behavioral1/memory/4736-37-0x0000000002350000-0x0000000002363000-memory.dmp healer behavioral1/memory/4736-35-0x0000000002350000-0x0000000002363000-memory.dmp healer behavioral1/memory/4736-33-0x0000000002350000-0x0000000002363000-memory.dmp healer behavioral1/memory/4736-31-0x0000000002350000-0x0000000002363000-memory.dmp healer behavioral1/memory/4736-29-0x0000000002350000-0x0000000002363000-memory.dmp healer behavioral1/memory/4736-27-0x0000000002350000-0x0000000002363000-memory.dmp healer behavioral1/memory/4736-25-0x0000000002350000-0x0000000002363000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 114016600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 114016600.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 114016600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 114016600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 255615461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 255615461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 255615461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 255615461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 255615461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 114016600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 114016600.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral1/memory/2168-105-0x00000000070F0000-0x000000000712C000-memory.dmp family_redline behavioral1/memory/2168-106-0x0000000007180000-0x00000000071BA000-memory.dmp family_redline behavioral1/memory/2168-112-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/2168-108-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/2168-107-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline behavioral1/memory/2168-110-0x0000000007180000-0x00000000071B5000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 301609041.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 3452 st802405.exe 1576 KF361654.exe 4736 114016600.exe 1132 255615461.exe 1152 301609041.exe 960 oneetx.exe 2168 475095745.exe 1820 oneetx.exe 4364 oneetx.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 114016600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 114016600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 255615461.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st802405.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" KF361654.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4800 1132 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 114016600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 475095745.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 301609041.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oneetx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KF361654.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language st802405.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 255615461.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4000 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4736 114016600.exe 4736 114016600.exe 1132 255615461.exe 1132 255615461.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4736 114016600.exe Token: SeDebugPrivilege 1132 255615461.exe Token: SeDebugPrivilege 2168 475095745.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2080 wrote to memory of 3452 2080 0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434N.exe 83 PID 2080 wrote to memory of 3452 2080 0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434N.exe 83 PID 2080 wrote to memory of 3452 2080 0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434N.exe 83 PID 3452 wrote to memory of 1576 3452 st802405.exe 85 PID 3452 wrote to memory of 1576 3452 st802405.exe 85 PID 3452 wrote to memory of 1576 3452 st802405.exe 85 PID 1576 wrote to memory of 4736 1576 KF361654.exe 86 PID 1576 wrote to memory of 4736 1576 KF361654.exe 86 PID 1576 wrote to memory of 4736 1576 KF361654.exe 86 PID 1576 wrote to memory of 1132 1576 KF361654.exe 93 PID 1576 wrote to memory of 1132 1576 KF361654.exe 93 PID 1576 wrote to memory of 1132 1576 KF361654.exe 93 PID 3452 wrote to memory of 1152 3452 st802405.exe 97 PID 3452 wrote to memory of 1152 3452 st802405.exe 97 PID 3452 wrote to memory of 1152 3452 st802405.exe 97 PID 1152 wrote to memory of 960 1152 301609041.exe 98 PID 1152 wrote to memory of 960 1152 301609041.exe 98 PID 1152 wrote to memory of 960 1152 301609041.exe 98 PID 2080 wrote to memory of 2168 2080 0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434N.exe 99 PID 2080 wrote to memory of 2168 2080 0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434N.exe 99 PID 2080 wrote to memory of 2168 2080 0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434N.exe 99 PID 960 wrote to memory of 4000 960 oneetx.exe 100 PID 960 wrote to memory of 4000 960 oneetx.exe 100 PID 960 wrote to memory of 4000 960 oneetx.exe 100 PID 960 wrote to memory of 3968 960 oneetx.exe 102 PID 960 wrote to memory of 3968 960 oneetx.exe 102 PID 960 wrote to memory of 3968 960 oneetx.exe 102 PID 3968 wrote to memory of 1320 3968 cmd.exe 104 PID 3968 wrote to memory of 1320 3968 cmd.exe 104 PID 3968 wrote to memory of 1320 3968 cmd.exe 104 PID 3968 wrote to memory of 1528 3968 cmd.exe 105 PID 3968 wrote to memory of 1528 3968 cmd.exe 105 PID 3968 wrote to memory of 1528 3968 cmd.exe 105 PID 3968 wrote to memory of 3248 3968 cmd.exe 106 PID 3968 wrote to memory of 3248 3968 cmd.exe 106 PID 3968 wrote to memory of 3248 3968 cmd.exe 106 PID 3968 wrote to memory of 1328 3968 cmd.exe 107 PID 3968 wrote to memory of 1328 3968 cmd.exe 107 PID 3968 wrote to memory of 1328 3968 cmd.exe 107 PID 3968 wrote to memory of 1756 3968 cmd.exe 108 PID 3968 wrote to memory of 1756 3968 cmd.exe 108 PID 3968 wrote to memory of 1756 3968 cmd.exe 108 PID 3968 wrote to memory of 4488 3968 cmd.exe 109 PID 3968 wrote to memory of 4488 3968 cmd.exe 109 PID 3968 wrote to memory of 4488 3968 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434N.exe"C:\Users\Admin\AppData\Local\Temp\0daf4621ae40ad5fdf517ecd432a70e97a817059e5a50a85668ab33804f5e434N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st802405.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st802405.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\KF361654.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\KF361654.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\114016600.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\114016600.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\255615461.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\255615461.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1132 -s 10925⤵
- Program crash
PID:4800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\301609041.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\301609041.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4000
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
- System Location Discovery: System Language Discovery
PID:1320
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"6⤵
- System Location Discovery: System Language Discovery
PID:1528
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E6⤵
- System Location Discovery: System Language Discovery
PID:3248
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
- System Location Discovery: System Language Discovery
PID:1328
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"6⤵
- System Location Discovery: System Language Discovery
PID:1756
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E6⤵
- System Location Discovery: System Language Discovery
PID:4488
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\475095745.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\475095745.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1132 -ip 11321⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:1820
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4364
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD53f34df34e8d1a4e22055283658035b99
SHA155779dcf0461289602c9a063b7add24946cd6322
SHA256b52bad3ea313125428d8da8098e561560245aa40482efb0ccf321dd1fa4dc4e9
SHA5124efed6c698cdaa90024ef0226c2e3c14146566b68f0ada43bc070793b191dcbba3a1a898d03e76ba866452901196b39a12fb09e1a77a5ab6eb93523acaa54f93
-
Filesize
577KB
MD58e2fb08ad1ae2c8d34fb35e06aab9f68
SHA1828a62993c64be5513fe4677f4649364ba0c80d7
SHA256c3b65ea99e1fe07a06d03ca0f3e720c285c7142042df6315811163de034cee19
SHA512cdf77f4697e0ac6ce670c324bf445204046f4d8f73958881063a18d155bf3c2e4e7cde1ea456902ce23ff2b075dd16ce3f860c4bd226f4a9c506051dd5dce7bf
-
Filesize
204KB
MD51304f384653e08ae497008ff13498608
SHA1d9a76ed63d74d4217c5027757cb9a7a0d0093080
SHA2562a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa
SHA5124138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1
-
Filesize
406KB
MD5a0ca4132a5f032fbb6e22845b3cb30c4
SHA1936079621b645bf10f3fb9e1912750b85a89aa2a
SHA25642ec226b7fe23e83f4da740b51ce5486f598a4a3df59f5bac196683a6c2e9535
SHA5122dda45a023ae239eb4398fed76166ac7ec860e6a353e4e12f7be7f305e357766fade92367e293a1e15866c137b2fc3284e782546231604f440b90bfefa83acf1
-
Filesize
176KB
MD52b71f4b18ac8214a2bff547b6ce2f64f
SHA1b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5
SHA256f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc
SHA51233518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177
-
Filesize
258KB
MD52aaf211ab2444526caf304ff3428d5d8
SHA1606f60574dfb89f689dbdf386bb1dffd755e1924
SHA2564fa3a501027e4c1eefa272a817a0d9840ad7da17b1abd090981e102f6ef9f2a7
SHA512f2610449891d297e2f7ad49023261cc0183fbcbb05a746da9e10744c91f8b54ebaac33910f70eed1ab8cad9fe7cb663df48f03e0f402e2cd22ce606e5922773e