Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 02:32
General
-
Target
ExeraLoader.exe
-
Size
3.0MB
-
MD5
967a76406b833408269300b470cba1d7
-
SHA1
1988b2f59f9dcc09035ba413d1a81f724ce6d727
-
SHA256
226ec253ffea4cf694beead5ee591540a056fbf423bdf39f7f1ce7f17241aa79
-
SHA512
1d36400a043c30f0f76e117287a2a05d0dedb322ab1a38db8e4990c155ccf14f60a54f81ae4860f6b4e35a411d9ea15388b3c2cfd3ef81bb5673d2c362200dd2
-
SSDEEP
49152:Cs7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpau/nRFfjI7L0qb:CsHTPJg8z1mKnypSbRxo9JCm
Malware Config
Extracted
orcus
ExeraDBD
31.44.184.52:57581
sudo_cphi4rohn8s06p230o7ave0vlq6yznce
-
autostart_method
Disable
-
enable_keylogger
false
-
install_path
%appdata%\linelinux\protectgeo.exe
-
reconnect_delay
10000
-
registry_keyname
Sudik
-
taskscheduler_taskname
sudik
-
watchdog_path
AppData\aga.exe
Signatures
-
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000023cbf-13.dat family_orcus -
Orcurs Rat Executable 2 IoCs
resource yara_rule behavioral1/memory/2576-1-0x0000000000430000-0x000000000072E000-memory.dmp orcus behavioral1/files/0x0008000000023cbf-13.dat orcus -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000\Control Panel\International\Geo\Nation ExeraLoader.exe -
Executes dropped EXE 6 IoCs
pid Process 4440 protectgeo.exe 4880 protectgeo.exe 640 protectgeo.exe 4560 protectgeo.exe 2312 protectgeo.exe 3760 protectgeo.exe -
Loads dropped DLL 11 IoCs
pid Process 1320 msbuild.exe 1320 msbuild.exe 1320 msbuild.exe 1320 msbuild.exe 1320 msbuild.exe 1320 msbuild.exe 1320 msbuild.exe 1320 msbuild.exe 1320 msbuild.exe 1320 msbuild.exe 1320 msbuild.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4440 set thread context of 1320 4440 protectgeo.exe 91 PID 4880 set thread context of 2444 4880 protectgeo.exe 94 PID 640 set thread context of 2552 640 protectgeo.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msbuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language protectgeo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language protectgeo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language protectgeo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language protectgeo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language protectgeo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language protectgeo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExeraLoader.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2211717155-842865201-3404093980-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 2576 ExeraLoader.exe 4440 protectgeo.exe 4440 protectgeo.exe 4440 protectgeo.exe 4440 protectgeo.exe 4440 protectgeo.exe 4440 protectgeo.exe 4880 protectgeo.exe 4880 protectgeo.exe 4880 protectgeo.exe 4880 protectgeo.exe 640 protectgeo.exe 640 protectgeo.exe 640 protectgeo.exe 640 protectgeo.exe 640 protectgeo.exe 640 protectgeo.exe 640 protectgeo.exe 640 protectgeo.exe 1320 msbuild.exe 1320 msbuild.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2576 ExeraLoader.exe Token: SeDebugPrivilege 4440 protectgeo.exe Token: SeDebugPrivilege 4880 protectgeo.exe Token: SeDebugPrivilege 640 protectgeo.exe Token: SeDebugPrivilege 1320 msbuild.exe Token: SeDebugPrivilege 1636 taskmgr.exe Token: SeSystemProfilePrivilege 1636 taskmgr.exe Token: SeCreateGlobalPrivilege 1636 taskmgr.exe Token: 33 1636 taskmgr.exe Token: SeIncBasePriorityPrivilege 1636 taskmgr.exe -
Suspicious use of FindShellTrayWindow 56 IoCs
pid Process 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe -
Suspicious use of SendNotifyMessage 56 IoCs
pid Process 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe 1636 taskmgr.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2576 wrote to memory of 4440 2576 ExeraLoader.exe 87 PID 2576 wrote to memory of 4440 2576 ExeraLoader.exe 87 PID 2576 wrote to memory of 4440 2576 ExeraLoader.exe 87 PID 4440 wrote to memory of 316 4440 protectgeo.exe 89 PID 4440 wrote to memory of 316 4440 protectgeo.exe 89 PID 4440 wrote to memory of 316 4440 protectgeo.exe 89 PID 4440 wrote to memory of 3424 4440 protectgeo.exe 90 PID 4440 wrote to memory of 3424 4440 protectgeo.exe 90 PID 4440 wrote to memory of 3424 4440 protectgeo.exe 90 PID 4440 wrote to memory of 1320 4440 protectgeo.exe 91 PID 4440 wrote to memory of 1320 4440 protectgeo.exe 91 PID 4440 wrote to memory of 1320 4440 protectgeo.exe 91 PID 4440 wrote to memory of 1320 4440 protectgeo.exe 91 PID 4440 wrote to memory of 1320 4440 protectgeo.exe 91 PID 4440 wrote to memory of 1320 4440 protectgeo.exe 91 PID 4440 wrote to memory of 1320 4440 protectgeo.exe 91 PID 4440 wrote to memory of 1320 4440 protectgeo.exe 91 PID 4880 wrote to memory of 4516 4880 protectgeo.exe 93 PID 4880 wrote to memory of 4516 4880 protectgeo.exe 93 PID 4880 wrote to memory of 4516 4880 protectgeo.exe 93 PID 4880 wrote to memory of 2444 4880 protectgeo.exe 94 PID 4880 wrote to memory of 2444 4880 protectgeo.exe 94 PID 4880 wrote to memory of 2444 4880 protectgeo.exe 94 PID 4880 wrote to memory of 2444 4880 protectgeo.exe 94 PID 4880 wrote to memory of 2444 4880 protectgeo.exe 94 PID 4880 wrote to memory of 2444 4880 protectgeo.exe 94 PID 4880 wrote to memory of 2444 4880 protectgeo.exe 94 PID 4880 wrote to memory of 2444 4880 protectgeo.exe 94 PID 640 wrote to memory of 4408 640 protectgeo.exe 97 PID 640 wrote to memory of 4408 640 protectgeo.exe 97 PID 640 wrote to memory of 4408 640 protectgeo.exe 97 PID 640 wrote to memory of 3056 640 protectgeo.exe 98 PID 640 wrote to memory of 3056 640 protectgeo.exe 98 PID 640 wrote to memory of 3056 640 protectgeo.exe 98 PID 640 wrote to memory of 3160 640 protectgeo.exe 99 PID 640 wrote to memory of 3160 640 protectgeo.exe 99 PID 640 wrote to memory of 3160 640 protectgeo.exe 99 PID 640 wrote to memory of 2552 640 protectgeo.exe 100 PID 640 wrote to memory of 2552 640 protectgeo.exe 100 PID 640 wrote to memory of 2552 640 protectgeo.exe 100 PID 640 wrote to memory of 2552 640 protectgeo.exe 100 PID 640 wrote to memory of 2552 640 protectgeo.exe 100 PID 640 wrote to memory of 2552 640 protectgeo.exe 100 PID 640 wrote to memory of 2552 640 protectgeo.exe 100 PID 640 wrote to memory of 2552 640 protectgeo.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExeraLoader.exe"C:\Users\Admin\AppData\Local\Temp\ExeraLoader.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Roaming\linelinux\protectgeo.exe"C:\Users\Admin\AppData\Roaming\linelinux\protectgeo.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵PID:316
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵PID:3424
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
-
C:\Users\Admin\AppData\Roaming\linelinux\protectgeo.exeC:\Users\Admin\AppData\Roaming\linelinux\protectgeo.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵PID:4516
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2444
-
-
C:\Users\Admin\AppData\Roaming\linelinux\protectgeo.exeC:\Users\Admin\AppData\Roaming\linelinux\protectgeo.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵PID:4408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵PID:3056
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵PID:3160
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2552
-
-
C:\Users\Admin\AppData\Roaming\linelinux\protectgeo.exeC:\Users\Admin\AppData\Roaming\linelinux\protectgeo.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4560
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1636
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1444
-
C:\Users\Admin\AppData\Roaming\linelinux\protectgeo.exeC:\Users\Admin\AppData\Roaming\linelinux\protectgeo.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2312
-
C:\Users\Admin\AppData\Roaming\linelinux\protectgeo.exeC:\Users\Admin\AppData\Roaming\linelinux\protectgeo.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5663b8d5469caa4489d463aa9bc18124f
SHA1e57123a7d969115853ea631a3b33826335025d28
SHA2567b4fa505452f0b8ac74bb31f5a03b13342836318018fb18d224ae2ff11b1a7e8
SHA51245e373295125a629fcc0b19609608d969c9106514918bfac5d6b8e340e407434577b825741b8fa6a043c8f3f5c1a030ba8857da5f4e8ef15a551ce3c5fe03b55
-
Filesize
125KB
MD52b44c70c49b70d797fbb748158b5d9bb
SHA193e00e6527e461c45c7868d14cf05c007e478081
SHA2563762d43c83af69cd38c9341a927ca6bd00f6bae8217c874d693047d6df4705bf
SHA512faced62f6ecbfa2ee0d7a47e300302d23030d1f28758cbe9c442e9d8d4f8359c59088aa6237a28103e43d248c8efc7eeaf2c184028701b752df6cce92d6854d0
-
C:\Users\Admin\AppData\Roaming\linelinux\lib_sudo_cphi4rohn8s06p230o7ave0vlq6yznce\SharpDX.Direct3D11.dll
Filesize271KB
MD598eb5ba5871acdeaebf3a3b0f64be449
SHA1c965284f60ef789b00b10b3df60ee682b4497de3
SHA256d7617d926648849cbfef450b8f48e458ee52e2793fb2251a30094b778aa8848c
SHA512a60025e304713d333e4b82b2d0be28087950688b049c98d2db5910c00b8d45b92e16d25ac8a58ff1318de019de3a9a00c7cbf8a6ad4b5bb1cb175dafa1b9bea2
-
C:\Users\Admin\AppData\Roaming\linelinux\lib_sudo_cphi4rohn8s06p230o7ave0vlq6yznce\SharpDX.Direct3D9.dll
Filesize338KB
MD5934da0e49208d0881c44fe19d5033840
SHA1a19c5a822e82e41752a08d3bd9110db19a8a5016
SHA25602da4af8cd4a8de19d816000caaae885e676b9e52f136ff071a279c2b8ad34c7
SHA512de62f629c2299b50af62893244a28895d63b78138c8632449984306f45de16bd01076eadbb0d75a700215e970c1df731e202ea640236c0f0da6ed15146193b59
-
Filesize
247KB
MD5ffb4b61cc11bec6d48226027c2c26704
SHA1fa8b9e344accbdc4dffa9b5d821d23f0716da29e
SHA256061542ff3fb36039b7bbffdf3e07b66176b264c1dfd834a14b09c08620717303
SHA51248aa6130bf1f5bd6de19256bbdf754c0158b43dd122cec47bb801a7a7b56f2da268bfdec24d135621764a23278ead3dcc35911a057e2dfa55a348bae8ef7b8a9
-
C:\Users\Admin\AppData\Roaming\linelinux\lib_sudo_cphi4rohn8s06p230o7ave0vlq6yznce\TurboJpegWrapper.dll
Filesize1.3MB
MD5ac6acc235ebef6374bed71b37e322874
SHA1a267baad59cd7352167636836bad4b971fcd6b6b
SHA256047b042cebf4c851f0d14f85f16ce952f03e48c20362d4ed9390875d4900fe96
SHA51272ac8b8c8f27264cc261297c325d14a0be2084d007c6132ab8402d87f912fe9189cb074db11625d9f86d29a6188f22a89e58ae45c9131fac4522473567017081
-
C:\Users\Admin\AppData\Roaming\linelinux\lib_sudo_cphi4rohn8s06p230o7ave0vlq6yznce\x86\turbojpeg.dll
Filesize646KB
MD582898ed19da89d7d44e280a3ced95e9b
SHA1eec0af5733c642eac8c5e08479f462d1ec1ed4db
SHA2565f4b9f8360764d75c9faaecd94f6d200c54611b33064cd216e363d973dae7c29
SHA512ee7b884ce7d7366ee28fb17721b6c89bd4eba8fb373cdbb483e26a4ed7a74ab5db847513c54704d753d77a7e18b1fb9fee90ed6bbc0540bff702273fda36b682
-
Filesize
3.0MB
MD5967a76406b833408269300b470cba1d7
SHA11988b2f59f9dcc09035ba413d1a81f724ce6d727
SHA256226ec253ffea4cf694beead5ee591540a056fbf423bdf39f7f1ce7f17241aa79
SHA5121d36400a043c30f0f76e117287a2a05d0dedb322ab1a38db8e4990c155ccf14f60a54f81ae4860f6b4e35a411d9ea15388b3c2cfd3ef81bb5673d2c362200dd2
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad