Overview
overview
10Static
static
100706909124...af.exe
windows7-x64
100706909124...af.exe
windows10-2004-x64
10092a8a750e...b8.exe
windows7-x64
10092a8a750e...b8.exe
windows10-2004-x64
100b4363ea1b...c7.exe
windows7-x64
100b4363ea1b...c7.exe
windows10-2004-x64
101474031cf4...a5.exe
windows7-x64
101474031cf4...a5.exe
windows10-2004-x64
101c64423afe...82.exe
windows7-x64
101c64423afe...82.exe
windows10-2004-x64
1024754063ad...fb.exe
windows7-x64
1024754063ad...fb.exe
windows10-2004-x64
10262ab91f7f...5c.exe
windows7-x64
10262ab91f7f...5c.exe
windows10-2004-x64
102c6e778930...90.exe
windows7-x64
102c6e778930...90.exe
windows10-2004-x64
10313130ecff...14.exe
windows7-x64
10313130ecff...14.exe
windows10-2004-x64
103a142d0199...a1.exe
windows7-x64
103a142d0199...a1.exe
windows10-2004-x64
10473246aff3...2b.exe
windows7-x64
10473246aff3...2b.exe
windows10-2004-x64
10532651acde...62.exe
windows7-x64
10532651acde...62.exe
windows10-2004-x64
1054d317bff9...74.exe
windows7-x64
1054d317bff9...74.exe
windows10-2004-x64
10574c22b9ce...30.exe
windows7-x64
10574c22b9ce...30.exe
windows10-2004-x64
106d76abe8ee...21.exe
windows7-x64
106d76abe8ee...21.exe
windows10-2004-x64
1076f01f1de9...6d.exe
windows7-x64
376f01f1de9...6d.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 12:11
Behavioral task
behavioral1
Sample
07069091241215607c36cbe294255edb67c26fd27ebee8923c0d0e23fc0b7baf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07069091241215607c36cbe294255edb67c26fd27ebee8923c0d0e23fc0b7baf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
092a8a750e5d4aee2bae9207ee5cfcaad2db4224f93cc3efe52fb113a2808db8.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
092a8a750e5d4aee2bae9207ee5cfcaad2db4224f93cc3efe52fb113a2808db8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
0b4363ea1bbc55747d0c878125637bcf50aaeb4fc44b1b972c7b8daedc2512c7.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
0b4363ea1bbc55747d0c878125637bcf50aaeb4fc44b1b972c7b8daedc2512c7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1474031cf449fb6bc31aa6bb646941714610874a7663787f62a07d817b614ea5.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
1474031cf449fb6bc31aa6bb646941714610874a7663787f62a07d817b614ea5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
1c64423afe71c8539881c789518416a72ef8ee611727513e1f47c9c9154bb782.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
1c64423afe71c8539881c789518416a72ef8ee611727513e1f47c9c9154bb782.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
262ab91f7f3303121efe6ceec005edeabf80ebe5cfc53a807ae99b636597985c.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
262ab91f7f3303121efe6ceec005edeabf80ebe5cfc53a807ae99b636597985c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
2c6e7789308643ecb686566eba4753a825da5dab42e11fb207f8bbfa330f3990.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
2c6e7789308643ecb686566eba4753a825da5dab42e11fb207f8bbfa330f3990.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
313130ecff1098fa44652ff626976d22f759ada06900b3e1ea125f412bf90814.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
313130ecff1098fa44652ff626976d22f759ada06900b3e1ea125f412bf90814.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
3a142d0199bd1e8504b199948f5b2742fcd704316875051f5f8cc3e75d6a1da1.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
3a142d0199bd1e8504b199948f5b2742fcd704316875051f5f8cc3e75d6a1da1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
473246aff3e141d2fc390990fa13a49cf36f66a8ace5f230250e7035981e1f2b.exe
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
473246aff3e141d2fc390990fa13a49cf36f66a8ace5f230250e7035981e1f2b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
532651acde43a5fb82a5c4de5c3dd9ef5809e5a75d52bb9af1c672c08e8c9062.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
532651acde43a5fb82a5c4de5c3dd9ef5809e5a75d52bb9af1c672c08e8c9062.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
54d317bff9681eb1d6bfd7691dd4096dd2bc4cc3a5a02be8f80aab623f349874.exe
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
54d317bff9681eb1d6bfd7691dd4096dd2bc4cc3a5a02be8f80aab623f349874.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
574c22b9ce95cd6205f7ff6bab0e414c1e0d6bc26070819ce1c1ba0ccb710930.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
574c22b9ce95cd6205f7ff6bab0e414c1e0d6bc26070819ce1c1ba0ccb710930.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
6d76abe8ee33124ffde9dae2f6bccf7836b23ab3d0a92d9458b557c362c41e21.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
6d76abe8ee33124ffde9dae2f6bccf7836b23ab3d0a92d9458b557c362c41e21.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
76f01f1de9ec5556d4b90155924980e6783c41dc8a2d36c653f403418343496d.exe
Resource
win7-20240903-en
General
-
Target
24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe
-
Size
315KB
-
MD5
1300dd3d984b5b8292b91f9071c89330
-
SHA1
a8b5ed155d8d8b5cd4833d0243b3dc760a86a7aa
-
SHA256
24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb
-
SHA512
296c4a6fb660c888edf4260973989ccbfed22695a4efb61d5654d24f87a4a825e271bd6e5d996e241292d875cf3cbf62a4654c84f8013a74ed37352e5925bcd4
-
SSDEEP
3072:bZx8gJscuAnU+JYoutueXlL0NL6UkUkc/z58LfPEDod/2WggPqQX/mGV/vl:t2AsnAnUJoSqL6UHR/zu7OkzPr+WV
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\137:UDP = "137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001" MusaLLaT.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\138:UDP = "138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002" MusaLLaT.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List MusaLLaT.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\139:TCP = "139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004" MusaLLaT.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List\445:TCP = "445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005" MusaLLaT.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" MusaLLaT.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "2" MusaLLaT.exe -
Ramnit family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" MusaLLaT.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" MusaLLaT.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" MusaLLaT.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\WINDOWS\system32\drivers\etc\hosts MusaLLaT.exe File opened for modification C:\WINDOWS\system32\drivers\etc\hosts MusaLLaT.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Sr\ImagePath = "\\SystemRoot\\system32\\DRIVERS\\sr.sys" MusaLLaT.exe -
Executes dropped EXE 3 IoCs
pid Process 2680 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fbmgr.exe 2768 MusaLLaT.exe 2564 MusaLLaTmgr.exe -
Loads dropped DLL 10 IoCs
pid Process 2328 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 2328 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 2680 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fbmgr.exe 2680 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fbmgr.exe 2328 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 2328 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 2768 MusaLLaT.exe 2768 MusaLLaT.exe 2564 MusaLLaTmgr.exe 2564 MusaLLaTmgr.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" MusaLLaT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\MusaLLaT = "C:\\Users\\Admin\\AppData\\Roaming\\MusaLLaT.exe" MusaLLaT.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" MusaLLaT.exe -
resource yara_rule behavioral11/memory/2328-1-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral11/memory/2680-10-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral11/memory/2680-21-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral11/files/0x00050000000194e7-29.dat upx behavioral11/memory/2328-44-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral11/memory/2328-31-0x0000000002D00000-0x0000000002DBC000-memory.dmp upx behavioral11/memory/2768-39-0x0000000000400000-0x00000000004BC000-memory.dmp upx behavioral11/memory/2768-57-0x0000000000400000-0x00000000004BC000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 2672 2680 WerFault.exe 30 2556 2564 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fbmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MusaLLaT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MusaLLaTmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2768 MusaLLaT.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 2328 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe Token: SeBackupPrivilege 2768 MusaLLaT.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2328 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 2768 MusaLLaT.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2680 2328 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 30 PID 2328 wrote to memory of 2680 2328 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 30 PID 2328 wrote to memory of 2680 2328 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 30 PID 2328 wrote to memory of 2680 2328 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 30 PID 2328 wrote to memory of 2768 2328 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 32 PID 2328 wrote to memory of 2768 2328 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 32 PID 2328 wrote to memory of 2768 2328 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 32 PID 2328 wrote to memory of 2768 2328 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe 32 PID 2768 wrote to memory of 2564 2768 MusaLLaT.exe 33 PID 2768 wrote to memory of 2564 2768 MusaLLaT.exe 33 PID 2768 wrote to memory of 2564 2768 MusaLLaT.exe 33 PID 2768 wrote to memory of 2564 2768 MusaLLaT.exe 33 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" MusaLLaT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe"C:\Users\Admin\AppData\Local\Temp\24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb.exe"1⤵
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fbmgr.exeC:\Users\Admin\AppData\Local\Temp\24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fbmgr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 1803⤵
- Program crash
PID:2672
-
-
-
C:\Users\Admin\AppData\Roaming\MusaLLaT.exeC:\Users\Admin\AppData\Roaming\MusaLLaT.exe2⤵
- Modifies firewall policy service
- Modifies security service
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2768 -
C:\Users\Admin\AppData\Roaming\MusaLLaTmgr.exeC:\Users\Admin\AppData\Roaming\MusaLLaTmgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2564 -s 1804⤵
- Program crash
PID:2556
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315KB
MD51300dd3d984b5b8292b91f9071c89330
SHA1a8b5ed155d8d8b5cd4833d0243b3dc760a86a7aa
SHA25624754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fb
SHA512296c4a6fb660c888edf4260973989ccbfed22695a4efb61d5654d24f87a4a825e271bd6e5d996e241292d875cf3cbf62a4654c84f8013a74ed37352e5925bcd4
-
\Users\Admin\AppData\Local\Temp\24754063ad81e8ab4be77eac0a61cdf74054083d04947327adf4a062c6ef84fbmgr.exe
Filesize184KB
MD51d92c741bc5b2d34dcd0a0265ab54275
SHA1a160982825420567c15f6c11f777cb4ccbe69bb8
SHA2563aab3cf37efd4c034da13a0d7ba8725f49a21d227e05f3bba91d8d36350f4a67
SHA5121da728dba6383e0e9fc51370f8fb782a15e724b57b952d952e4c719f81d517a56035b1e9496da3d7f9bf79af0a4bd5caa8a351ca60f40d637da3648224944b94
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
1.1MB
MD59b98d47916ead4f69ef51b56b0c2323c
SHA1290a80b4ded0efc0fd00816f373fcea81a521330
SHA25696e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b
SHA51268b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94