Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 19:33
Static task
static1
General
-
Target
243915e48274892d6d9c24e3774f1e250bf3b645e9d57e18530f36e7a8edf181.exe
-
Size
6.8MB
-
MD5
3f9d6c3c4886a8685e657a41c91b5344
-
SHA1
0163e180b5061276357cda512365c0d3ea06b72c
-
SHA256
243915e48274892d6d9c24e3774f1e250bf3b645e9d57e18530f36e7a8edf181
-
SHA512
e476e55e16538e7a2d3227310c58ad0a0a4413dbbf6906cedb905fd4124e787c5fe243a38829df3914fab9d246f9f1e6683794fa03cf0a86f74c2770b056b67c
-
SSDEEP
196608:oicJ9X7+V9R7gdfn8h+yXh8DA4D+y8EDafcCv8:Wi9kOh8DA4DXDaq
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://mindhandru.buzz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://mindhandru.buzz/api
https://prisonyfork.buzz/api
https://rebuildeso.buzz/api
https://scentniej.buzz/api
https://inherineau.buzz/api
https://screwamusresz.buzz/api
https://appliacnesot.buzz/api
https://cashfuzysao.buzz/api
https://hummskitnj.buzz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4f184Z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4f184Z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4f184Z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4f184Z.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4f184Z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4f184Z.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2Q6864.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3f89u.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4f184Z.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1u84X3.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2Q6864.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2Q6864.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1u84X3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1u84X3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4f184Z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3f89u.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3f89u.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4f184Z.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 1u84X3.exe -
Executes dropped EXE 10 IoCs
pid Process 184 F7u67.exe 3528 s5w95.exe 3908 1u84X3.exe 4320 skotes.exe 3984 2Q6864.exe 1864 3f89u.exe 4384 skotes.exe 3096 4f184Z.exe 1640 skotes.exe 4452 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 1u84X3.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 2Q6864.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 3f89u.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 4f184Z.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4f184Z.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4f184Z.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 243915e48274892d6d9c24e3774f1e250bf3b645e9d57e18530f36e7a8edf181.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" F7u67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" s5w95.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 3908 1u84X3.exe 4320 skotes.exe 3984 2Q6864.exe 1864 3f89u.exe 4384 skotes.exe 3096 4f184Z.exe 1640 skotes.exe 4452 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1u84X3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2704 1864 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2Q6864.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f89u.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f184Z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 243915e48274892d6d9c24e3774f1e250bf3b645e9d57e18530f36e7a8edf181.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F7u67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s5w95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1u84X3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3f89u.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3f89u.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3908 1u84X3.exe 3908 1u84X3.exe 4320 skotes.exe 4320 skotes.exe 3984 2Q6864.exe 3984 2Q6864.exe 1864 3f89u.exe 1864 3f89u.exe 4384 skotes.exe 4384 skotes.exe 1864 3f89u.exe 1864 3f89u.exe 3096 4f184Z.exe 3096 4f184Z.exe 3096 4f184Z.exe 3096 4f184Z.exe 1640 skotes.exe 1640 skotes.exe 4452 skotes.exe 4452 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3096 4f184Z.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3908 1u84X3.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2512 wrote to memory of 184 2512 243915e48274892d6d9c24e3774f1e250bf3b645e9d57e18530f36e7a8edf181.exe 83 PID 2512 wrote to memory of 184 2512 243915e48274892d6d9c24e3774f1e250bf3b645e9d57e18530f36e7a8edf181.exe 83 PID 2512 wrote to memory of 184 2512 243915e48274892d6d9c24e3774f1e250bf3b645e9d57e18530f36e7a8edf181.exe 83 PID 184 wrote to memory of 3528 184 F7u67.exe 84 PID 184 wrote to memory of 3528 184 F7u67.exe 84 PID 184 wrote to memory of 3528 184 F7u67.exe 84 PID 3528 wrote to memory of 3908 3528 s5w95.exe 85 PID 3528 wrote to memory of 3908 3528 s5w95.exe 85 PID 3528 wrote to memory of 3908 3528 s5w95.exe 85 PID 3908 wrote to memory of 4320 3908 1u84X3.exe 86 PID 3908 wrote to memory of 4320 3908 1u84X3.exe 86 PID 3908 wrote to memory of 4320 3908 1u84X3.exe 86 PID 3528 wrote to memory of 3984 3528 s5w95.exe 87 PID 3528 wrote to memory of 3984 3528 s5w95.exe 87 PID 3528 wrote to memory of 3984 3528 s5w95.exe 87 PID 184 wrote to memory of 1864 184 F7u67.exe 95 PID 184 wrote to memory of 1864 184 F7u67.exe 95 PID 184 wrote to memory of 1864 184 F7u67.exe 95 PID 2512 wrote to memory of 3096 2512 243915e48274892d6d9c24e3774f1e250bf3b645e9d57e18530f36e7a8edf181.exe 110 PID 2512 wrote to memory of 3096 2512 243915e48274892d6d9c24e3774f1e250bf3b645e9d57e18530f36e7a8edf181.exe 110 PID 2512 wrote to memory of 3096 2512 243915e48274892d6d9c24e3774f1e250bf3b645e9d57e18530f36e7a8edf181.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\243915e48274892d6d9c24e3774f1e250bf3b645e9d57e18530f36e7a8edf181.exe"C:\Users\Admin\AppData\Local\Temp\243915e48274892d6d9c24e3774f1e250bf3b645e9d57e18530f36e7a8edf181.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\F7u67.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\F7u67.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5w95.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5w95.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1u84X3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1u84X3.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4320
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Q6864.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Q6864.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3f89u.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3f89u.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 15804⤵
- Program crash
PID:2704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4f184Z.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4f184Z.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1864 -ip 18641⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4452
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD599f2650f08690801ee96fdaa87caf3f7
SHA1a99d9ab53e1629fb35dc42f833476341af8138c9
SHA25672f6bf7dda65e27dfeb6b2e28022d4b5b6956c2fbc012b9d46202b33a29bbfdc
SHA5124b3913968f0f8c843ca4625910e177a7b80b7d6745a96765c35b572ae9082f31ec6c93327e38ea2e846ac8798690205b379dfcde681068e61f78bcec02117733
-
Filesize
5.2MB
MD59dcb6fab76f3f95707b238185215b7ed
SHA1ad67cbf1004ae7247112120195b0526e4fcee83d
SHA2563c4bb05e7c764a746ade979302cc261cc32389a380c13720f56cb6cf2c4817d3
SHA51295373471086cb0397b213f300655024e6f187553075ece49ce2ca8423d07fa365cdaa3e95a12f7d77b71d6400d1e38da79b08e8d5a4ee489621d636d0db88236
-
Filesize
4.9MB
MD5918e4d1abf21f088a94746a2f17768ec
SHA1a1684d7b99be71ae852a9cab4978d98506c9166b
SHA25638300f513b13136da06d17928459a4a6daa64e5cc7a6ca3db1cc73e48222808d
SHA512be471f8fc4aaff9349a764ce3766d979c5c706b5528d0ce8aa82f3970ede0bede292253203e720caa578cc019aea60ec5ce1acf147091f0f00aac25e6e3d682f
-
Filesize
3.6MB
MD5bc2af9812538f05fa9b727f916e1a2b9
SHA125d9580c169f114893285d3177f653001e40d13e
SHA2564f0a1bbd49b5eb7e42193f89d97cdb834cd84da92007125fc52bbe69a408a401
SHA512179b7950f1f7ef6fa9efe0a12572a8fd3ccd6ef99a6db5ebe8471b1174219649710ff735f8f1e70facb3c7bb0e59444f11513ca7c5477ccbf1410dddebdfa42d
-
Filesize
3.2MB
MD54614056155a78b787c059535bb1c4ec3
SHA177987e3421346285490439a98421c06610c8bddb
SHA256ceff378ba455ba298b382da33c44243ea47d672edf2c8cf59347f646bd70ca68
SHA5121347bdb1e69303c3bdca534bbb4956eff1f64b259bf587b95b3678cb02946b01c64b6f6ce782b28bee1410c07ef73eeef65bb9f79f719330e3ba6ceac24526bd
-
Filesize
1.8MB
MD5d1f6c2083d94c10bf23c7364e0553d90
SHA173c77c7c0a0e07970cfea13a3032fd214836849c
SHA2563fd3fd24c4062b35ebab8f893be3c41be54d687dda4236c8f17121dc85a426dc
SHA5128d2fc6d97a487ade3d335fcb17d04db3b4850a6f72a09a9dae15522705b1f7e633c86a1820ee8fb67278d9fe7f8d442e5bc28755a69160fb8a6337cc2d4c11fc