Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe
Resource
win7-20240903-en
General
-
Target
2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe
-
Size
11.0MB
-
MD5
1216b81c1f7b36aaad1ffed2c982fa2b
-
SHA1
cc05886a6bc38396431fba11b14ddf4b4c576aa9
-
SHA256
1702a224613323deeeba21fa405ec74979e7c6e474f2d5b11973ebf4e4155972
-
SHA512
1d5fd317b16ba48b66edac90f2cdbc3ff44a048a9e9f3d92417ea12d50ee8b0ab90e097abcbc4d318a1483eda10860845e6f462ee023a1e8190d7cf545179c39
-
SSDEEP
98304:mwIMFaSRnwIMFaSRcwIMFaSRfwIMFaSRIwIMFaSRQpFK0U8AmJNIo:7JRwJR5JRYJRtJRmFKzYN
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
xworm
3.1
23.26.201.172:8899
REaMgxQu68UQguvi
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/memory/2632-35-0x0000000000400000-0x00000000004CB000-memory.dmp family_xworm behavioral1/memory/2632-34-0x0000000000400000-0x00000000004CB000-memory.dmp family_xworm behavioral1/files/0x00080000000192a9-40.dat family_xworm behavioral1/memory/2124-59-0x0000000001270000-0x000000000127E000-memory.dmp family_xworm -
Xred family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2072 powershell.exe 1856 powershell.exe 1488 powershell.exe 1952 powershell.exe -
Executes dropped EXE 7 IoCs
pid Process 2124 ._cache_2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 1396 Synaptics.exe 2256 Synaptics.exe 1864 Synaptics.exe 448 Synaptics.exe 2800 Synaptics.exe 2784 Synaptics.exe -
Loads dropped DLL 2 IoCs
pid Process 2632 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 2632 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2348 set thread context of 2632 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2748 schtasks.exe 3052 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 2072 powershell.exe 1856 powershell.exe 2124 ._cache_2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 1396 Synaptics.exe 1488 powershell.exe 1952 powershell.exe 1396 Synaptics.exe 1396 Synaptics.exe 1396 Synaptics.exe 1396 Synaptics.exe 1396 Synaptics.exe 1396 Synaptics.exe 1396 Synaptics.exe 1396 Synaptics.exe 1396 Synaptics.exe 1396 Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe Token: SeDebugPrivilege 2072 powershell.exe Token: SeDebugPrivilege 1856 powershell.exe Token: SeDebugPrivilege 2124 ._cache_2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe Token: SeDebugPrivilege 1396 Synaptics.exe Token: SeDebugPrivilege 1488 powershell.exe Token: SeDebugPrivilege 1952 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2124 ._cache_2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2072 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 31 PID 2348 wrote to memory of 2072 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 31 PID 2348 wrote to memory of 2072 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 31 PID 2348 wrote to memory of 2072 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 31 PID 2348 wrote to memory of 1856 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 33 PID 2348 wrote to memory of 1856 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 33 PID 2348 wrote to memory of 1856 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 33 PID 2348 wrote to memory of 1856 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 33 PID 2348 wrote to memory of 2748 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 34 PID 2348 wrote to memory of 2748 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 34 PID 2348 wrote to memory of 2748 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 34 PID 2348 wrote to memory of 2748 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 34 PID 2348 wrote to memory of 2632 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 37 PID 2348 wrote to memory of 2632 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 37 PID 2348 wrote to memory of 2632 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 37 PID 2348 wrote to memory of 2632 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 37 PID 2348 wrote to memory of 2632 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 37 PID 2348 wrote to memory of 2632 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 37 PID 2348 wrote to memory of 2632 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 37 PID 2348 wrote to memory of 2632 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 37 PID 2348 wrote to memory of 2632 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 37 PID 2348 wrote to memory of 2632 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 37 PID 2348 wrote to memory of 2632 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 37 PID 2348 wrote to memory of 2632 2348 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 37 PID 2632 wrote to memory of 2124 2632 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 38 PID 2632 wrote to memory of 2124 2632 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 38 PID 2632 wrote to memory of 2124 2632 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 38 PID 2632 wrote to memory of 2124 2632 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 38 PID 2632 wrote to memory of 1396 2632 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 39 PID 2632 wrote to memory of 1396 2632 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 39 PID 2632 wrote to memory of 1396 2632 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 39 PID 2632 wrote to memory of 1396 2632 2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe 39 PID 1396 wrote to memory of 1488 1396 Synaptics.exe 40 PID 1396 wrote to memory of 1488 1396 Synaptics.exe 40 PID 1396 wrote to memory of 1488 1396 Synaptics.exe 40 PID 1396 wrote to memory of 1488 1396 Synaptics.exe 40 PID 1396 wrote to memory of 1952 1396 Synaptics.exe 42 PID 1396 wrote to memory of 1952 1396 Synaptics.exe 42 PID 1396 wrote to memory of 1952 1396 Synaptics.exe 42 PID 1396 wrote to memory of 1952 1396 Synaptics.exe 42 PID 1396 wrote to memory of 3052 1396 Synaptics.exe 43 PID 1396 wrote to memory of 3052 1396 Synaptics.exe 43 PID 1396 wrote to memory of 3052 1396 Synaptics.exe 43 PID 1396 wrote to memory of 3052 1396 Synaptics.exe 43 PID 1396 wrote to memory of 1864 1396 Synaptics.exe 46 PID 1396 wrote to memory of 1864 1396 Synaptics.exe 46 PID 1396 wrote to memory of 1864 1396 Synaptics.exe 46 PID 1396 wrote to memory of 1864 1396 Synaptics.exe 46 PID 1396 wrote to memory of 2256 1396 Synaptics.exe 47 PID 1396 wrote to memory of 2256 1396 Synaptics.exe 47 PID 1396 wrote to memory of 2256 1396 Synaptics.exe 47 PID 1396 wrote to memory of 2256 1396 Synaptics.exe 47 PID 1396 wrote to memory of 448 1396 Synaptics.exe 48 PID 1396 wrote to memory of 448 1396 Synaptics.exe 48 PID 1396 wrote to memory of 448 1396 Synaptics.exe 48 PID 1396 wrote to memory of 448 1396 Synaptics.exe 48 PID 1396 wrote to memory of 2800 1396 Synaptics.exe 49 PID 1396 wrote to memory of 2800 1396 Synaptics.exe 49 PID 1396 wrote to memory of 2800 1396 Synaptics.exe 49 PID 1396 wrote to memory of 2800 1396 Synaptics.exe 49 PID 1396 wrote to memory of 2784 1396 Synaptics.exe 50 PID 1396 wrote to memory of 2784 1396 Synaptics.exe 50 PID 1396 wrote to memory of 2784 1396 Synaptics.exe 50 PID 1396 wrote to memory of 2784 1396 Synaptics.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\rgrkFqQ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rgrkFqQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD549.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\._cache_2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2124
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\rgrkFqQ.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rgrkFqQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9B1.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3052
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1864
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:2256
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:448
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:2800
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:2784
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.0MB
MD51216b81c1f7b36aaad1ffed2c982fa2b
SHA1cc05886a6bc38396431fba11b14ddf4b4c576aa9
SHA2561702a224613323deeeba21fa405ec74979e7c6e474f2d5b11973ebf4e4155972
SHA5121d5fd317b16ba48b66edac90f2cdbc3ff44a048a9e9f3d92417ea12d50ee8b0ab90e097abcbc4d318a1483eda10860845e6f462ee023a1e8190d7cf545179c39
-
Filesize
1KB
MD5148a330501aa2da45124327de1144dd7
SHA1abf42dc889fca06e33835409976d560eb7833d5d
SHA25625a7d0ac77caaeddbfd97ddfe39a0ecfd5c8fc55a3e940f3bc1778b30d3a3283
SHA512d8acc24536064d8627cb7bc0d4ba7bfc577e534eaa4935a50ae8789b06c3245caebc8dddc94de69e35c84cfc3a863d982d92871f638e3b6f91a19852b2236ab1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c072d25d4af8beab43a28382a88a7078
SHA19b193e18faa13796d6f64ac46b226d921129e5af
SHA256f75016f14b5f67931e29e917af4646096b7a3de75d1bce486c7f4ae4048cfa54
SHA51202f6a8b5f17520a32d8d5ce12a9fe0846cad0cb04f0680fac7c1279a3ffdb154dd0ac0cc8cb04ebbe0c1d733292360d8528a5b6e473122e59bbcaa2c52c561e0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD514491c1ab57ca6dadfcba543d7518ff1
SHA15e231a8fa360a6cd91a90ed3d64e52db1b380e4d
SHA256cf0bf4ec9e285543d3c233ac9df940711293c94723d52e07755b257953467866
SHA512d636384aef128f1acc91d7805bffe1cc0b28c02cbceb004236f91064148bfda3bb8e3c4adf3fb4d96e8692dbe4db9e17b8c38c44e4f94924e5a421bcc229acc6
-
\Users\Admin\AppData\Local\Temp\._cache_2024-12-20_1216b81c1f7b36aaad1ffed2c982fa2b_luca-stealer_magniber.exe
Filesize33KB
MD50201f6d2fa823471b937234b7ea29d6b
SHA1ee4e6d415a529e14381ebdf9a68347cdac57792d
SHA25676a1329afd87d9c83bff12bb13f73917aaef94e5729f0ef460078d2876337fdb
SHA512b9cad8c42d67b9854bfc8fe7b37fc6f7a39e59e556e8975eb26bd42de10c502fba8a848a04d8ef26679b6ffc8b7e22e1af1d46f1ddf85bda4fd35ef4c1cdfea4