Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 18:35
Static task
static1
General
-
Target
167f2c3220576c1a500f69c95b5e61c1aaff9171465adb197f0f620bfee3b9ca.exe
-
Size
7.1MB
-
MD5
1a6a75e5a7ce926ddfa4fc19122bc205
-
SHA1
15572996a846a37324eb81e05308e136ea2679e6
-
SHA256
167f2c3220576c1a500f69c95b5e61c1aaff9171465adb197f0f620bfee3b9ca
-
SHA512
93275f686b5d57f452e0435e5855722a18cbc68b99360e7e3e5577e3f782ca414090431e51bc6c1c92055bbd1e3a0a482c6d8c853b3d1561964522effcb63014
-
SSDEEP
196608:IOZy29TBvf/u/u+owHzOMmG7tWQM43naT1GA6om5+z:IeV9TJnYlRHzOMmwxnF95
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Processes:
4Y451j.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4Y451j.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4Y451j.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4Y451j.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4Y451j.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4Y451j.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4Y451j.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
2U3546.exe3U04d.exe4Y451j.exeskotes.exeskotes.exeskotes.exe1S35a4.exeskotes.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2U3546.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3U04d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4Y451j.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1S35a4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exeskotes.exeskotes.exe2U3546.exe3U04d.exe1S35a4.exe4Y451j.exeskotes.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2U3546.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3U04d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1S35a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2U3546.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4Y451j.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3U04d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1S35a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4Y451j.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1S35a4.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1S35a4.exe -
Executes dropped EXE 10 IoCs
Processes:
Y2e39.exeB9V60.exe1S35a4.exeskotes.exe2U3546.exe3U04d.exe4Y451j.exeskotes.exeskotes.exeskotes.exepid Process 1884 Y2e39.exe 2180 B9V60.exe 2448 1S35a4.exe 4824 skotes.exe 4852 2U3546.exe 2260 3U04d.exe 3620 4Y451j.exe 4808 skotes.exe 4112 skotes.exe 216 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exeskotes.exe1S35a4.exeskotes.exe2U3546.exe3U04d.exe4Y451j.exeskotes.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 1S35a4.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2U3546.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3U04d.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 4Y451j.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe -
Processes:
4Y451j.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4Y451j.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4Y451j.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
167f2c3220576c1a500f69c95b5e61c1aaff9171465adb197f0f620bfee3b9ca.exeY2e39.exeB9V60.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 167f2c3220576c1a500f69c95b5e61c1aaff9171465adb197f0f620bfee3b9ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Y2e39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" B9V60.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
1S35a4.exeskotes.exe2U3546.exe3U04d.exe4Y451j.exeskotes.exeskotes.exeskotes.exepid Process 2448 1S35a4.exe 4824 skotes.exe 4852 2U3546.exe 2260 3U04d.exe 3620 4Y451j.exe 4808 skotes.exe 4112 skotes.exe 216 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
1S35a4.exedescription ioc Process File created C:\Windows\Tasks\skotes.job 1S35a4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3U04d.exe4Y451j.exe167f2c3220576c1a500f69c95b5e61c1aaff9171465adb197f0f620bfee3b9ca.exeY2e39.exeB9V60.exe1S35a4.exeskotes.exe2U3546.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3U04d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4Y451j.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 167f2c3220576c1a500f69c95b5e61c1aaff9171465adb197f0f620bfee3b9ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y2e39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B9V60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1S35a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2U3546.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
1S35a4.exeskotes.exe2U3546.exe3U04d.exe4Y451j.exeskotes.exeskotes.exeskotes.exepid Process 2448 1S35a4.exe 2448 1S35a4.exe 4824 skotes.exe 4824 skotes.exe 4852 2U3546.exe 4852 2U3546.exe 2260 3U04d.exe 2260 3U04d.exe 3620 4Y451j.exe 3620 4Y451j.exe 4808 skotes.exe 4808 skotes.exe 3620 4Y451j.exe 3620 4Y451j.exe 4112 skotes.exe 4112 skotes.exe 216 skotes.exe 216 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
4Y451j.exedescription pid Process Token: SeDebugPrivilege 3620 4Y451j.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
1S35a4.exepid Process 2448 1S35a4.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
167f2c3220576c1a500f69c95b5e61c1aaff9171465adb197f0f620bfee3b9ca.exeY2e39.exeB9V60.exe1S35a4.exedescription pid Process procid_target PID 2440 wrote to memory of 1884 2440 167f2c3220576c1a500f69c95b5e61c1aaff9171465adb197f0f620bfee3b9ca.exe 82 PID 2440 wrote to memory of 1884 2440 167f2c3220576c1a500f69c95b5e61c1aaff9171465adb197f0f620bfee3b9ca.exe 82 PID 2440 wrote to memory of 1884 2440 167f2c3220576c1a500f69c95b5e61c1aaff9171465adb197f0f620bfee3b9ca.exe 82 PID 1884 wrote to memory of 2180 1884 Y2e39.exe 83 PID 1884 wrote to memory of 2180 1884 Y2e39.exe 83 PID 1884 wrote to memory of 2180 1884 Y2e39.exe 83 PID 2180 wrote to memory of 2448 2180 B9V60.exe 84 PID 2180 wrote to memory of 2448 2180 B9V60.exe 84 PID 2180 wrote to memory of 2448 2180 B9V60.exe 84 PID 2448 wrote to memory of 4824 2448 1S35a4.exe 85 PID 2448 wrote to memory of 4824 2448 1S35a4.exe 85 PID 2448 wrote to memory of 4824 2448 1S35a4.exe 85 PID 2180 wrote to memory of 4852 2180 B9V60.exe 86 PID 2180 wrote to memory of 4852 2180 B9V60.exe 86 PID 2180 wrote to memory of 4852 2180 B9V60.exe 86 PID 1884 wrote to memory of 2260 1884 Y2e39.exe 91 PID 1884 wrote to memory of 2260 1884 Y2e39.exe 91 PID 1884 wrote to memory of 2260 1884 Y2e39.exe 91 PID 2440 wrote to memory of 3620 2440 167f2c3220576c1a500f69c95b5e61c1aaff9171465adb197f0f620bfee3b9ca.exe 92 PID 2440 wrote to memory of 3620 2440 167f2c3220576c1a500f69c95b5e61c1aaff9171465adb197f0f620bfee3b9ca.exe 92 PID 2440 wrote to memory of 3620 2440 167f2c3220576c1a500f69c95b5e61c1aaff9171465adb197f0f620bfee3b9ca.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\167f2c3220576c1a500f69c95b5e61c1aaff9171465adb197f0f620bfee3b9ca.exe"C:\Users\Admin\AppData\Local\Temp\167f2c3220576c1a500f69c95b5e61c1aaff9171465adb197f0f620bfee3b9ca.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Y2e39.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Y2e39.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\B9V60.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\B9V60.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1S35a4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1S35a4.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2U3546.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2U3546.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3U04d.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3U04d.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Y451j.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4Y451j.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4112
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:216
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD55af36bb43cce3acc83f3113ba20156ee
SHA18a51b7a9f5195321a68736ecb4a8c6356c80af94
SHA25608451cdd0fd94f955d77aa2c6439ee9b441ce204a3b4b49ca8096ec5f3d7c402
SHA512e03ae96ac9bb4ec55d33b87a6c302a46a83d8fed80712a212217cb89c3b56e53f8e892f6eb42e61e0601e4f1f909f1f5b2e6001623d018f243d78eb0418cbdec
-
Filesize
5.5MB
MD5b3c65efc4b11fb94d5dfe3fb1eac76d1
SHA1689bf0ec508e62daf13aa879a6e9e889e8de14e6
SHA2565d47912c5e231f9cf378021085fe1d91a20f377ec3f928f385900bd51fc3cf04
SHA5126d44d52c524263edd674b71d70fdf2e96867601d4621e83ac4b0f8d73cc94eee87251fd32b1a4bfae296cc9cd450fec42b706a4312d61b9334e3914082e9ee94
-
Filesize
1.7MB
MD5a6a5206fd22c5bef02eabdf3152414e3
SHA197cdb21c7343613cb4e7b20291fa50d36682d451
SHA2561e55248aeae25b8281871f9771133ee30b88b32e8c44f6ce0e3ac1ca0214da9b
SHA5122911bc1f5737bab4221e4a51f7269b3a91e0d5ab1135fc2128df08b9f6caff329b91e38e5ae75471f55664f87b46a977654108b2dc17db8078aadd9c0ab7ef47
-
Filesize
3.7MB
MD507371c7461bab51bcc7b199fb2538ac1
SHA1c9c9a44b7eae53d1183e5f4fdbd966587bae7545
SHA2560edb2b3d0b336ba6ef95b09d542c629502161d04aa439f5a41d855464b3fe130
SHA512167984e46c663c4220fb3fd786f3ddebf13ba1b774036fc403baf032e1b22147b05850e4441ca817da9bf0641bf8b65c2732e76bf40726eacbda0fe5d23f09e0
-
Filesize
1.8MB
MD578d4dee0280d6956a51b9273f0ad737d
SHA12ef2fa793744883d76fa5bae923921bc9c30adb6
SHA2560303ddb89a4883dd612b2781fe062bdf4492883aa54955b9bc022d4565ed51ca
SHA5121d8c2603530a5531826e268127b6b2707c616caaa12c92d34f9346ca1cb813a5f778f2842db39e95d51727aaca6bc80e784dae399937df95de79b72b302ab847
-
Filesize
1.8MB
MD58fef87827d3d6d483a5651baed2430a2
SHA14e000643d43d03ed9447c97923c835d7d2950ce6
SHA2564464c4cead60d120714fc0b1dbcc130efbbca4aa6e9efd46679fe1b429a1562c
SHA5123f1243a012f1543d48c42270fbc902f63db997bdbb8fcb43fe051f787b9157b25ff91a1cc593e1c557cc0acc72ff2bf209d055b0efc38ddc8f26081e63c3dd77