Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 22:56
Static task
static1
General
-
Target
e8f9bc3254f0cf32f92b1b06ce0a9e00f3e58478c497cea43d942115c7ed8a64.exe
-
Size
7.1MB
-
MD5
cf2cdc1397ecdd08593a3e59a5321677
-
SHA1
433561b5e8c1e039309299f8155cf16ad64d150a
-
SHA256
e8f9bc3254f0cf32f92b1b06ce0a9e00f3e58478c497cea43d942115c7ed8a64
-
SHA512
01d8585df1cb2b56336767c7033b29dee9f4017a577bea508c1eef8c9bccf67ed14a3b61d0805ee55c4e7f935c0bbe7f1dc8e9e19bec08a09114747dda05ffab
-
SSDEEP
98304:C0YaGkzVJosUx/J7DADxyLYuqiQi6pmYP85Cv9xzEoUJJqF08uvBx85UtHJjVt/L:CoSdJHADxyL6LpckpEo88uvB62tpci
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2428-56-0x0000000000F50000-0x00000000013A4000-memory.dmp healer behavioral1/memory/2428-57-0x0000000000F50000-0x00000000013A4000-memory.dmp healer behavioral1/memory/2428-64-0x0000000000F50000-0x00000000013A4000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 4A599E.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4A599E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4A599E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4A599E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4A599E.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4A599E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4A599E.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4A599E.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 4A599E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 4A599E.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3o84q.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4A599E.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1r86k6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2j7800.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2j7800.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3o84q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1r86k6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2j7800.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4A599E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4A599E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1r86k6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3o84q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 1r86k6.exe -
Executes dropped EXE 9 IoCs
pid Process 2128 b8w44.exe 1132 u8Z40.exe 2132 1r86k6.exe 4056 skotes.exe 1672 2j7800.exe 4360 3o84q.exe 2428 4A599E.exe 2348 skotes.exe 4200 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 1r86k6.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 2j7800.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 3o84q.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 4A599E.exe -
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4A599E.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4A599E.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e8f9bc3254f0cf32f92b1b06ce0a9e00f3e58478c497cea43d942115c7ed8a64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" b8w44.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" u8Z40.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2132 1r86k6.exe 4056 skotes.exe 1672 2j7800.exe 4360 3o84q.exe 2428 4A599E.exe 2348 skotes.exe 4200 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1r86k6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2236 4360 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3o84q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4A599E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8f9bc3254f0cf32f92b1b06ce0a9e00f3e58478c497cea43d942115c7ed8a64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8w44.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language u8Z40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1r86k6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2j7800.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3o84q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3o84q.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2132 1r86k6.exe 2132 1r86k6.exe 4056 skotes.exe 4056 skotes.exe 1672 2j7800.exe 1672 2j7800.exe 4360 3o84q.exe 4360 3o84q.exe 4360 3o84q.exe 4360 3o84q.exe 2428 4A599E.exe 2428 4A599E.exe 2428 4A599E.exe 2428 4A599E.exe 2348 skotes.exe 2348 skotes.exe 4200 skotes.exe 4200 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2428 4A599E.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 1r86k6.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2128 2444 e8f9bc3254f0cf32f92b1b06ce0a9e00f3e58478c497cea43d942115c7ed8a64.exe 83 PID 2444 wrote to memory of 2128 2444 e8f9bc3254f0cf32f92b1b06ce0a9e00f3e58478c497cea43d942115c7ed8a64.exe 83 PID 2444 wrote to memory of 2128 2444 e8f9bc3254f0cf32f92b1b06ce0a9e00f3e58478c497cea43d942115c7ed8a64.exe 83 PID 2128 wrote to memory of 1132 2128 b8w44.exe 84 PID 2128 wrote to memory of 1132 2128 b8w44.exe 84 PID 2128 wrote to memory of 1132 2128 b8w44.exe 84 PID 1132 wrote to memory of 2132 1132 u8Z40.exe 85 PID 1132 wrote to memory of 2132 1132 u8Z40.exe 85 PID 1132 wrote to memory of 2132 1132 u8Z40.exe 85 PID 2132 wrote to memory of 4056 2132 1r86k6.exe 86 PID 2132 wrote to memory of 4056 2132 1r86k6.exe 86 PID 2132 wrote to memory of 4056 2132 1r86k6.exe 86 PID 1132 wrote to memory of 1672 1132 u8Z40.exe 87 PID 1132 wrote to memory of 1672 1132 u8Z40.exe 87 PID 1132 wrote to memory of 1672 1132 u8Z40.exe 87 PID 2128 wrote to memory of 4360 2128 b8w44.exe 89 PID 2128 wrote to memory of 4360 2128 b8w44.exe 89 PID 2128 wrote to memory of 4360 2128 b8w44.exe 89 PID 2444 wrote to memory of 2428 2444 e8f9bc3254f0cf32f92b1b06ce0a9e00f3e58478c497cea43d942115c7ed8a64.exe 109 PID 2444 wrote to memory of 2428 2444 e8f9bc3254f0cf32f92b1b06ce0a9e00f3e58478c497cea43d942115c7ed8a64.exe 109 PID 2444 wrote to memory of 2428 2444 e8f9bc3254f0cf32f92b1b06ce0a9e00f3e58478c497cea43d942115c7ed8a64.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8f9bc3254f0cf32f92b1b06ce0a9e00f3e58478c497cea43d942115c7ed8a64.exe"C:\Users\Admin\AppData\Local\Temp\e8f9bc3254f0cf32f92b1b06ce0a9e00f3e58478c497cea43d942115c7ed8a64.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b8w44.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b8w44.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8Z40.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8Z40.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1r86k6.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1r86k6.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2j7800.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2j7800.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3o84q.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3o84q.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4360 -s 15764⤵
- Program crash
PID:2236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4A599E.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4A599E.exe2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4360 -ip 43601⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4200
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5e4fc3bbf4f4085a07e563977fd3a2da2
SHA1feabd50ed4b53ca43c3c9a4028595006090b5943
SHA2561e42deff79759363b0138ececed5352a8778c23a825594d1230d516e0a63ce8f
SHA512758911ab3250e1f403d466b7f4ba0f597a02dac19bca699cfc4e702478cfaaa9a6e412962c29deead639909d2f5e8d74c40331048d9ddb39bf03410fd9a81d5c
-
Filesize
5.4MB
MD5ca2b1d090c1e8c5a0fd4d5740fcae210
SHA1c6036fcedd7512557a6e726f47bba5fa8c576f6c
SHA256234161424189ca3624e5329dda4f9fc546dc3fec6625873a9340eae3da5ea453
SHA51290e7afd93f1561c579831b833dc7e640161a80e60683f9e3778b5a6120cc823c963e40b4297d7e722b71fd1c764582269baeabfe9db17230e2f9b1a68a04416e
-
Filesize
1.7MB
MD507f4024a9ce4fa36d2ee6907ec0e827c
SHA1772203f6cbf91f48e318d2b398b61e88b81a75c0
SHA256f13895a9f499d1c2783747f6f5c96ac690ff2423b1496cc86b6912c67a7cafd9
SHA51282e863a69f59c94137a43c2584f6b800430e0264fd293a05ab43eca4cdabc5b8ad29464dd5ca93282ff25cd17c90ee6188c63f2e9f378b72426970713d5f97c4
-
Filesize
3.6MB
MD50f2694c577c0e4ba4005084df8f2e6f4
SHA1b38c47be5bdf04657d9032989db4142a2d83ea8b
SHA256daeb45d2dc967e494a35adbad775c12193a342fe1b5ea1fb4cb81b8aaad68287
SHA512e5dac0ad208d839f6e99d248bed81a4856551004c6f9589e14c0378f0b1bf64ea944ffe701e8451206b8c214f1c854e6a3e1a5758ec83d342a2e310c4b4cacf9
-
Filesize
1.8MB
MD53a195fdffecfd980ba54e1da4e3a92af
SHA13037a139e770f1884787a517c53286b38ae7f1db
SHA2569d7d15ecbd4d11924b8e66257ea70740588df5657fb0d96953a3ae021a094b04
SHA51286b6a9af4f0f4bea237a072fd89b6510bc09729bd0263c1c3ec3ed4b4bb24fe3c0ee99a3ea624a5d0182bc91e03e3587217f473f398e2529251d8d41705691f5
-
Filesize
3.0MB
MD5c10e6bb2901e074834896f8bf59fd295
SHA171b451896a013f4999d1f84b60fa8d0b77e6e5a1
SHA256065f4a2970169fce0d386cd1d83bd017f9f5e57465caf37dc5e9d08e15731802
SHA51277aca4690790a2a1c4820188d04104fbb65c737ffcc55e83fb14aec01edcaacf59006654289d9197d9910d9828b663220a48fb1c058ee095231e11c68bd3dd92