Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 06:00
Static task
static1
General
-
Target
8efa925c17d0e73075d9d5a873efdedea0df3df0684e58bdb87b0d65b0c6fea5.exe
-
Size
6.8MB
-
MD5
32bf70929ed4305be8a1c6470e25b0a2
-
SHA1
1ed2305ec167260a5c3ed7df154a0e45f127eee1
-
SHA256
8efa925c17d0e73075d9d5a873efdedea0df3df0684e58bdb87b0d65b0c6fea5
-
SHA512
25802465cba1294f500cc94c566b251306184eb3f149734cc3d2124f8be0ab11c20c088c6e5b84b5608a4412fe8a6a4036efe42a5d2b0429fd8b24ef09eed3a9
-
SSDEEP
196608:UtRl9oRH8/q5eUJHK5/UrqF3OvCVPIu2Vt:UHlk4Web5crHKOuO
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://mindhandru.buzz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://mindhandru.buzz/api
https://prisonyfork.buzz/api
https://rebuildeso.buzz/api
https://scentniej.buzz/api
https://inherineau.buzz/api
https://screwamusresz.buzz/api
https://appliacnesot.buzz/api
https://cashfuzysao.buzz/api
https://hummskitnj.buzz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4X974G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4X974G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4X974G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4X974G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4X974G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4X974G.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1z95b9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2x3541.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3T16b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4X974G.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1z95b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2x3541.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3T16b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3T16b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2x3541.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4X974G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1z95b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4X974G.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 1z95b9.exe -
Executes dropped EXE 10 IoCs
pid Process 1560 w7m32.exe 1668 I2h01.exe 744 1z95b9.exe 4492 skotes.exe 2360 2x3541.exe 644 3T16b.exe 1496 skotes.exe 4504 4X974G.exe 3884 skotes.exe 2636 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 1z95b9.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 2x3541.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3T16b.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 4X974G.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4X974G.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4X974G.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8efa925c17d0e73075d9d5a873efdedea0df3df0684e58bdb87b0d65b0c6fea5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" w7m32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" I2h01.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 744 1z95b9.exe 4492 skotes.exe 2360 2x3541.exe 644 3T16b.exe 1496 skotes.exe 4504 4X974G.exe 3884 skotes.exe 2636 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1z95b9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3808 644 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w7m32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language I2h01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1z95b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2x3541.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3T16b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4X974G.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8efa925c17d0e73075d9d5a873efdedea0df3df0684e58bdb87b0d65b0c6fea5.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3T16b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3T16b.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 744 1z95b9.exe 744 1z95b9.exe 4492 skotes.exe 4492 skotes.exe 2360 2x3541.exe 2360 2x3541.exe 644 3T16b.exe 644 3T16b.exe 1496 skotes.exe 1496 skotes.exe 644 3T16b.exe 644 3T16b.exe 4504 4X974G.exe 4504 4X974G.exe 4504 4X974G.exe 4504 4X974G.exe 3884 skotes.exe 3884 skotes.exe 2636 skotes.exe 2636 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4504 4X974G.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 744 1z95b9.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1560 1848 8efa925c17d0e73075d9d5a873efdedea0df3df0684e58bdb87b0d65b0c6fea5.exe 83 PID 1848 wrote to memory of 1560 1848 8efa925c17d0e73075d9d5a873efdedea0df3df0684e58bdb87b0d65b0c6fea5.exe 83 PID 1848 wrote to memory of 1560 1848 8efa925c17d0e73075d9d5a873efdedea0df3df0684e58bdb87b0d65b0c6fea5.exe 83 PID 1560 wrote to memory of 1668 1560 w7m32.exe 84 PID 1560 wrote to memory of 1668 1560 w7m32.exe 84 PID 1560 wrote to memory of 1668 1560 w7m32.exe 84 PID 1668 wrote to memory of 744 1668 I2h01.exe 85 PID 1668 wrote to memory of 744 1668 I2h01.exe 85 PID 1668 wrote to memory of 744 1668 I2h01.exe 85 PID 744 wrote to memory of 4492 744 1z95b9.exe 86 PID 744 wrote to memory of 4492 744 1z95b9.exe 86 PID 744 wrote to memory of 4492 744 1z95b9.exe 86 PID 1668 wrote to memory of 2360 1668 I2h01.exe 87 PID 1668 wrote to memory of 2360 1668 I2h01.exe 87 PID 1668 wrote to memory of 2360 1668 I2h01.exe 87 PID 1560 wrote to memory of 644 1560 w7m32.exe 89 PID 1560 wrote to memory of 644 1560 w7m32.exe 89 PID 1560 wrote to memory of 644 1560 w7m32.exe 89 PID 1848 wrote to memory of 4504 1848 8efa925c17d0e73075d9d5a873efdedea0df3df0684e58bdb87b0d65b0c6fea5.exe 110 PID 1848 wrote to memory of 4504 1848 8efa925c17d0e73075d9d5a873efdedea0df3df0684e58bdb87b0d65b0c6fea5.exe 110 PID 1848 wrote to memory of 4504 1848 8efa925c17d0e73075d9d5a873efdedea0df3df0684e58bdb87b0d65b0c6fea5.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\8efa925c17d0e73075d9d5a873efdedea0df3df0684e58bdb87b0d65b0c6fea5.exe"C:\Users\Admin\AppData\Local\Temp\8efa925c17d0e73075d9d5a873efdedea0df3df0684e58bdb87b0d65b0c6fea5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w7m32.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w7m32.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\I2h01.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\I2h01.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1z95b9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1z95b9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2x3541.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2x3541.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3T16b.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3T16b.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 644 -s 15524⤵
- Program crash
PID:3808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4X974G.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4X974G.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 644 -ip 6441⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2636
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD523fd5aa11a2ab5ad324e4c3620cfb8ff
SHA13fc52af29c1dd28d217b845cda5f332b424bfc9e
SHA25659d6747cbf0b5c8fe7c6f83aa2c1e8108076b08a33ca73b342a3760792862aca
SHA5122adacadbede401dcef49ebb8aff37ae07eb2a664d745b8fde07adcfd77c24acc811f03d66e79d9e65ae4dc19f3bef422e7b11b5231a6e47320003c31021762a1
-
Filesize
5.2MB
MD5d1a5e44809c73c87239139cbf105884d
SHA180c6592469354e7fc45ffbcf8a5323cc93610748
SHA256c4e497df3427071cc6e5cbe8019c39ae37d8dea2eb4f2f25cd153f3a489c04b8
SHA5120ab268a8a84e1c65f61d1a1f0796c2e9a56eed1eb06652cbfa38524c7c422ba460ddf455fea9fe6ec1f4478a04f8129cd51b440bc28edac27f57811f8a118375
-
Filesize
5.0MB
MD51451b57ba4eb5f5e50379fb8e3ef21c4
SHA1438b6c57df4c4e04f986c73bf752978d49df9d0d
SHA256047faf10f893cd97e831f436351a0dda5816093537f8a1cddd9a3e3334fea4a8
SHA512a84d04261973956b64b8bfae376f46491fcf1ad4fd8a9681bed53be7e40f5f2f577f52cd7ffb93a31a62d35c89db2b9c529e482ad7407554d869943665647afd
-
Filesize
3.6MB
MD5ee6ce2f0f758b3c83800c9890b90619f
SHA19775d2448873809040a04519c40b181b490f7221
SHA2565a7af9b5662c8bc0102bb62df8836c63cd9b623ce3d8d9849dc070a69c32c992
SHA5126c7ba91b8c6b51e9f81fca179d2a7b999bb8f9e0e64251e63272ff3fa3778aef0fc631859ece6e95f03fd31a6c4494697a2867525fa4774629c6616ab1818031
-
Filesize
3.1MB
MD56a2127b05c6fc5d0e9f5940f4e777a35
SHA1e3aa09b02499fe22cebdda5c43fdf2b2cc67c7b1
SHA256a43efd598a987adf7bf2f08d810bb9c7d3378818697aa94cdbb94341f7c1d458
SHA512966a560995b395b39aaccd2249ed627b4c24ec68b071c92700e2a762098c383fa2b15ae014be219107886fe49fa009ed755d323b621e3be5b43ec8283930c25d
-
Filesize
1.8MB
MD5f1f1fb7ce16d5883ea795e1ebbafcf7a
SHA176f16e6397a95661beeefa1ad5d033c819bdd884
SHA256d01629b4c91f9bdffa26efc4e7666093d830ec350d4e7435ad525813645a6af9
SHA512ed9a9225669b1fde54f6f1e234d391105e44e1ea7fdf1b5ea428178d2cc9a6fc17bdeea23b9b81cf74bf177fd302d570e6493f077fe81eb1c923065d183176c7