Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 12:58
Static task
static1
General
-
Target
ac8ca23fef15908fe1ef452bc3641d44b7e06002ada821aacf3e1b2343b5cbb2.exe
-
Size
6.7MB
-
MD5
02d8e3dfb37ca773b705752299d57f13
-
SHA1
1ddcc1f171102bbb7fd70e64ce93fe4363a5ae6c
-
SHA256
ac8ca23fef15908fe1ef452bc3641d44b7e06002ada821aacf3e1b2343b5cbb2
-
SHA512
da08426ea361b550cd05008e68ded019fda0b8f167be8d41f7517747a40a56a2bb44b1b4b0b9f07e05f447845f5447b9c4e228af62d882e3ad3de95092dddb0e
-
SSDEEP
196608:gBrEbkvVzM9Lu4PVeal9QAioJmHT0T+QJ:ae4BMpPYA+TJQJ
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://hummskitnj.buzz/api
https://cashfuzysao.buzz/api
https://appliacnesot.buzz/api
https://screwamusresz.buzz/api
https://inherineau.buzz/api
https://scentniej.buzz/api
https://rebuildeso.buzz/api
https://prisonyfork.buzz/api
https://mindhandru.buzz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://mindhandru.buzz/api
https://prisonyfork.buzz/api
https://rebuildeso.buzz/api
https://scentniej.buzz/api
https://inherineau.buzz/api
https://screwamusresz.buzz/api
https://appliacnesot.buzz/api
https://cashfuzysao.buzz/api
https://hummskitnj.buzz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4E635H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4E635H.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4E635H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4E635H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4E635H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4E635H.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2w9201.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3w58L.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4E635H.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1l71J9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2w9201.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3w58L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4E635H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1l71J9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1l71J9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2w9201.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3w58L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4E635H.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 1l71J9.exe -
Executes dropped EXE 10 IoCs
pid Process 2904 j4P50.exe 3372 d3r46.exe 1972 1l71J9.exe 3128 skotes.exe 2756 2w9201.exe 4028 skotes.exe 4204 3w58L.exe 4952 4E635H.exe 1952 skotes.exe 3936 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1l71J9.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 2w9201.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 3w58L.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 4E635H.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4E635H.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4E635H.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ac8ca23fef15908fe1ef452bc3641d44b7e06002ada821aacf3e1b2343b5cbb2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" j4P50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" d3r46.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1972 1l71J9.exe 3128 skotes.exe 2756 2w9201.exe 4028 skotes.exe 4204 3w58L.exe 4952 4E635H.exe 1952 skotes.exe 3936 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1l71J9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3284 4204 WerFault.exe 108 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2w9201.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3w58L.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4E635H.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac8ca23fef15908fe1ef452bc3641d44b7e06002ada821aacf3e1b2343b5cbb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j4P50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3r46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1l71J9.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3w58L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3w58L.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1972 1l71J9.exe 1972 1l71J9.exe 3128 skotes.exe 3128 skotes.exe 2756 2w9201.exe 2756 2w9201.exe 4028 skotes.exe 4028 skotes.exe 4204 3w58L.exe 4204 3w58L.exe 4204 3w58L.exe 4204 3w58L.exe 4952 4E635H.exe 4952 4E635H.exe 4952 4E635H.exe 4952 4E635H.exe 1952 skotes.exe 1952 skotes.exe 3936 skotes.exe 3936 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4952 4E635H.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 1l71J9.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3760 wrote to memory of 2904 3760 ac8ca23fef15908fe1ef452bc3641d44b7e06002ada821aacf3e1b2343b5cbb2.exe 85 PID 3760 wrote to memory of 2904 3760 ac8ca23fef15908fe1ef452bc3641d44b7e06002ada821aacf3e1b2343b5cbb2.exe 85 PID 3760 wrote to memory of 2904 3760 ac8ca23fef15908fe1ef452bc3641d44b7e06002ada821aacf3e1b2343b5cbb2.exe 85 PID 2904 wrote to memory of 3372 2904 j4P50.exe 86 PID 2904 wrote to memory of 3372 2904 j4P50.exe 86 PID 2904 wrote to memory of 3372 2904 j4P50.exe 86 PID 3372 wrote to memory of 1972 3372 d3r46.exe 87 PID 3372 wrote to memory of 1972 3372 d3r46.exe 87 PID 3372 wrote to memory of 1972 3372 d3r46.exe 87 PID 1972 wrote to memory of 3128 1972 1l71J9.exe 88 PID 1972 wrote to memory of 3128 1972 1l71J9.exe 88 PID 1972 wrote to memory of 3128 1972 1l71J9.exe 88 PID 3372 wrote to memory of 2756 3372 d3r46.exe 89 PID 3372 wrote to memory of 2756 3372 d3r46.exe 89 PID 3372 wrote to memory of 2756 3372 d3r46.exe 89 PID 2904 wrote to memory of 4204 2904 j4P50.exe 108 PID 2904 wrote to memory of 4204 2904 j4P50.exe 108 PID 2904 wrote to memory of 4204 2904 j4P50.exe 108 PID 3760 wrote to memory of 4952 3760 ac8ca23fef15908fe1ef452bc3641d44b7e06002ada821aacf3e1b2343b5cbb2.exe 114 PID 3760 wrote to memory of 4952 3760 ac8ca23fef15908fe1ef452bc3641d44b7e06002ada821aacf3e1b2343b5cbb2.exe 114 PID 3760 wrote to memory of 4952 3760 ac8ca23fef15908fe1ef452bc3641d44b7e06002ada821aacf3e1b2343b5cbb2.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac8ca23fef15908fe1ef452bc3641d44b7e06002ada821aacf3e1b2343b5cbb2.exe"C:\Users\Admin\AppData\Local\Temp\ac8ca23fef15908fe1ef452bc3641d44b7e06002ada821aacf3e1b2343b5cbb2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j4P50.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j4P50.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d3r46.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d3r46.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1l71J9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1l71J9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2w9201.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2w9201.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w58L.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3w58L.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 15524⤵
- Program crash
PID:3284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4E635H.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4E635H.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4204 -ip 42041⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3936
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD56662d1dfe1ef330f6d144cf0d370fc5b
SHA1f13e4020b7d2d2b62bd17cf57ef44bde7a404272
SHA25687737b9c2857ba5512cc2e6fc5f5eb268d06a4f58996d0853cfb27bfce7829bd
SHA5125605fa5ee1b6c615a7eff44ccf933551e587f3fbd6b1648910552ea99b825765b77ca17941c7b64cb66a82087ff1700207916720b69d0c5d3281a8ff1f9e1c24
-
Filesize
5.2MB
MD5fae8ae9f23acdf05850557b67c859f07
SHA1122918cec2264e8f2d41b925b285f6c34c93de2e
SHA256124f4597b7c655c3dc91e7ca662ddd642e00aad6f5fbab29dea31febeba70d83
SHA51244668be611949335e5a2b56fdd6e50cdd524f01f2492e708092039174d7531c764417e6545868345c99065a4cd96a90600a75d6b438cebc0c46c762b550c3251
-
Filesize
4.9MB
MD5552ef21b4e3ef804f134e4345a404962
SHA16778dc16edabaa006d0e9deb11b099c9892cea16
SHA2563e8225613104b9aa59b0a661e329a4269b9984284187884e44852026ad7fd49e
SHA512caa8361152d362111a6a73abde2cd2267bf29917053a68dc61fb4d99026581d4704e9cc9c17abf3e026efe67106fb3384ad4e2cb6efda90e5fc16980550383d6
-
Filesize
3.6MB
MD5dede14754686a80420e3660f0042fb00
SHA135865ee16cfd96eb93bb1880500a835386af1b37
SHA256ed9586e1a34540e09b4f3908faed725da5cb32af16067f3009239d08afd5ae4a
SHA51205a8c634fda4570813e37644714f1591e0497342b34c8e1e2309dd9eb233fb9c71b0e781090d0806b1e63e1920728525abef7930f5e360f3c45604481736d2fb
-
Filesize
3.1MB
MD5ec2a35e3463e2136520c98edf300662a
SHA1f9156be30c60a398cff4ab4dd746573afb054b64
SHA256f2b858b586c7fc03f4ebdfe528be92102742daba3074e2348b6d94e7d8ee036c
SHA5128732a24d9cef60779195b9fc67c9144eeea23b1672be37114111902560c6713031d1fb4c5bb3993686be1a9fe818103081c2a3bea3cb0bb0bbbc4b199aee7e22
-
Filesize
1.8MB
MD58384621273222debea0fcf855a0e1c0a
SHA156763534cb625a3c51274b4adb8952a236de1fec
SHA2567ab81c7619021a613018c6f111938ceb88ef17c36b8f9e45af96a1d125a177f3
SHA5122a0f4da6e5ef4a327effec22567eba6a1cb9161dafcfcb3d25037673cb08aea9f034796de7f6ea06f1537d83b2d42ba9bd90af35b6aa4d64b3d27dd0751aad39