Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-03-2021 12:03
Static task
static1
Behavioral task
behavioral1
Sample
0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe
Resource
win10v20201028
General
-
Target
0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe
-
Size
2.4MB
-
MD5
6d0fd5f76fbe861695b140828aac6443
-
SHA1
71b54d8219ab3a44ac434c41495c8d0db62a7d3f
-
SHA256
0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98
-
SHA512
e85fc4cbb64b4abdb1d76322e66ee7a007e8fc13f3dc9bd6d485aa36be345fda2494e44c665768388e3fe5c6aaeafc4d0926a62d69c13a2d06409182711527a6
Malware Config
Signatures
-
StrongPity
StrongPity is a spyware developed by PROMETHIUM APT group mainly used in government sponsored attacks.
-
StrongPity Spyware 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\ndaData\nvwmisrv.exe family_strongpity C:\Users\Admin\AppData\Local\Temp\ndaData\nvwmisrv.exe family_strongpity \Users\Admin\AppData\Local\Temp\ndaData\nvwmisrv.exe family_strongpity -
Executes dropped EXE 4 IoCs
Processes:
fnmsetup.exenvwmisrv.exefnmsetup.tmpwinmsism.exepid process 2004 fnmsetup.exe 2028 nvwmisrv.exe 1968 fnmsetup.tmp 1840 winmsism.exe -
Loads dropped DLL 7 IoCs
Processes:
0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exefnmsetup.exenvwmisrv.exefnmsetup.tmppid process 800 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe 800 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe 800 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe 2004 fnmsetup.exe 2028 nvwmisrv.exe 1968 fnmsetup.tmp 1968 fnmsetup.tmp -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\CUpdateTask = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ndaData\\nvwmisrv.exe" 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
fnmsetup.tmppid process 1968 fnmsetup.tmp -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exefnmsetup.exenvwmisrv.exedescription pid process target process PID 800 wrote to memory of 2004 800 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe fnmsetup.exe PID 800 wrote to memory of 2004 800 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe fnmsetup.exe PID 800 wrote to memory of 2004 800 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe fnmsetup.exe PID 800 wrote to memory of 2004 800 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe fnmsetup.exe PID 800 wrote to memory of 2004 800 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe fnmsetup.exe PID 800 wrote to memory of 2004 800 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe fnmsetup.exe PID 800 wrote to memory of 2004 800 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe fnmsetup.exe PID 800 wrote to memory of 2028 800 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe nvwmisrv.exe PID 800 wrote to memory of 2028 800 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe nvwmisrv.exe PID 800 wrote to memory of 2028 800 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe nvwmisrv.exe PID 800 wrote to memory of 2028 800 0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe nvwmisrv.exe PID 2004 wrote to memory of 1968 2004 fnmsetup.exe fnmsetup.tmp PID 2004 wrote to memory of 1968 2004 fnmsetup.exe fnmsetup.tmp PID 2004 wrote to memory of 1968 2004 fnmsetup.exe fnmsetup.tmp PID 2004 wrote to memory of 1968 2004 fnmsetup.exe fnmsetup.tmp PID 2004 wrote to memory of 1968 2004 fnmsetup.exe fnmsetup.tmp PID 2004 wrote to memory of 1968 2004 fnmsetup.exe fnmsetup.tmp PID 2004 wrote to memory of 1968 2004 fnmsetup.exe fnmsetup.tmp PID 2028 wrote to memory of 1840 2028 nvwmisrv.exe winmsism.exe PID 2028 wrote to memory of 1840 2028 nvwmisrv.exe winmsism.exe PID 2028 wrote to memory of 1840 2028 nvwmisrv.exe winmsism.exe PID 2028 wrote to memory of 1840 2028 nvwmisrv.exe winmsism.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe"C:\Users\Admin\AppData\Local\Temp\0e4651625abda88df56952b7e97d7fb64a3e1ea97bfe01e931d47381c0952e98.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\fnmsetup.exe"C:\Users\Admin\AppData\Local\Temp\fnmsetup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\is-RSI6J.tmp\fnmsetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-RSI6J.tmp\fnmsetup.tmp" /SL5="$300F0,1480519,54272,C:\Users\Admin\AppData\Local\Temp\fnmsetup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\ndaData\nvwmisrv.exe"C:\Users\Admin\AppData\Local\Temp\ndaData\nvwmisrv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\ndaData\winmsism.exe"C:\Users\Admin\AppData\Local\Temp\ndaData\winmsism.exe"3⤵
- Executes dropped EXE
PID:1840
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
65689075a82a08bb797bb9a5cc2932c9
SHA1a13b3baeedc3456bf8a03e6f7fd43b8ccfabc7e2
SHA256803b09f5863b583114d4db7d19ac0c5f64163c0075992bcfc289d27feea3a3ab
SHA51220a1ac3df849e09fe361d0de8c04f9d8598457e95427a30df9ab74316c2644aa30f782b88b171ffadd7be4b6fc85970ec539d003aa1244434be6a12bbb9b6ee6
-
MD5
65689075a82a08bb797bb9a5cc2932c9
SHA1a13b3baeedc3456bf8a03e6f7fd43b8ccfabc7e2
SHA256803b09f5863b583114d4db7d19ac0c5f64163c0075992bcfc289d27feea3a3ab
SHA51220a1ac3df849e09fe361d0de8c04f9d8598457e95427a30df9ab74316c2644aa30f782b88b171ffadd7be4b6fc85970ec539d003aa1244434be6a12bbb9b6ee6
-
MD5
8f144bcbcad0417e7823dd8e60218530
SHA19df092a764b8ad278ed574f00d1c065683eef6ac
SHA25639dfa032878743bba8244c73173c263e669131f0084a38f22c52b1383f627ba0
SHA512e093f69030fee17d8b55bde8337d409e8dfb583c97a81ed37425fb72122318d4c1f996d0d1bca28f24182ff5c8afe2be25eadc27951463ddca5c0abceca2a72d
-
MD5
cbf16804b8046d992f534b0e2263a3e2
SHA1daf8dd67f96c496dd4ec43c782cd1c21372ef399
SHA2569524d1085c96eb39b67311c776f803abf8abfe4cad09260ac189be0eeb69706d
SHA512f5d95d92197e77cdc510391c4c59860eb2396a203af3a00ede523de00883191e9dd283bd14b4ad673ff63c9273b956fef493f8b5b32efaf102d8e158439d0d53
-
MD5
f62a9e753bb25b746e402acc42dd3bad
SHA1325fe3a01c5930675e6ccb1671bbcb285f4c2258
SHA256d5a5c87fa06db598993414c5548615364c83339a85236b849a0b6151d4edf82b
SHA512e61bebaaa1c54b29c101acffd839fbe3590ef756a40fdd0f08eea4142905df4115c74e236ecfa66ec8c6108d50329d9663a49d1213d2d427d389a7fb42950ab4
-
MD5
48cbf8b9e1915cd3b5716dafab6ed2fa
SHA164f1db7749451c9c361c1dbab58831c313685870
SHA256ee0550f71a41f32ce1f7193d166e8173d4d5ae7235d94ea1c15147864c1f008d
SHA5121bada5ac88a4f9bf5e3514d403c7ca6d3cc55865a9228fb30a94a5732a8e61ad4823ecf9e60d43d55cc3f43807e8f51adbf6412b0252769c9d80eb842c94a3a7
-
MD5
976a9b87fba26bbc41f84341d1cde369
SHA14ecd3f3e8c1bb90f018fb657afcf08ed0bf5eaed
SHA2562e95c56510ce1a3529f772f5af8efe8b22e3672577ec4b68b7f1eec3cd89c674
SHA51265c0a5479ea5cb9b5092d6dc4beec4b52c7b467166202406deb56d6dd74a3bc7cf1da518452eefc9706d4ea96568a683217aec7ff7ea5070c2e719e4a57c1d3c
-
MD5
37f0fb87f79733beebacb8d5964d95ba
SHA1fb304ba16b55437205f2dc3cd4a77b052923c513
SHA256294ee6dc47cb85ccdf6efee650a04a90202408c7a717b2f968aeec1e24f78aeb
SHA512a1f6c22a02fb5a29ee84eb5e46d66864b0c90e302e0ba7dfca8fa8b19007e5cf06dcae619d233fea5dd03f70b338a8d9bbedb70fbe592f9197541d27b862b7c4
-
MD5
4cb8337b2d67412637e558b158884a1e
SHA16d62599bd953994d14331e85e42c89507b723f2a
SHA256474fdad577b63fe91db097bc643edf1264feff26bd16dd3a010ca0fede5e9cf9
SHA5128ed996c7cd6ca9119e336c429d0ad33250ed77d2879bd503f5536d7221ed321002cc8ac9a717e7aff3643f9dba2208c35c6c06cd0fc989881533f9bc76f45cae
-
MD5
4566463df582e721a45c9a161c9dcc0b
SHA1d162caf979d860601ac35883bbaf0a92ed150c05
SHA256ac9eb209c27cc4662476da65bec3e122bb8a9dfd194f734f265a6a2f394d26bd
SHA5122b034856e6cbe2d8c94ea229fe18ad9f07ce54fe13365040c274b8be9f67e2de2fe5d08ac7f45a44906e72719583149d2dbb4554ff72900302aa7ebaae863954
-
MD5
964932af9b0262662d9c28c6eaf18c62
SHA1755ef24b09aeaa512a21a95a0314f90fc83b1eae
SHA2568ab6d2e6b5f1e907eb501861f3515c96559f31d270c56fc6d76159ae21bdd5b3
SHA51252cbb80034bbe7d80d17b5bc03483367848dd17d4a04970ec4c863ee4ce588138cbfdf397ceeadb5d8a4ceb040ffdae82b4f284bf09579277f47f7df976ea314
-
MD5
f7971870edda665caf54c6caefb8672e
SHA13b4bd7b17935a3601172ee27483eccf5a5a938d3
SHA256d2b67438355398ea9d01f12546220e8108feae5677d483794f6ea8e1cf36b878
SHA5128ee8646858e4917698deebcc71e1e653a63bc1cc5a24444a56d83f0f0299f5feba1d061179f8d83f4f6220bf2eaaa6fc96aed3bcf185501757b826a7889309da
-
MD5
97747a597156974a2744eddad4148166
SHA10767885fab9ff5689cfe2c1d13ebb7669aea7fa1
SHA2566d0ce2c8f342bc9588f967ae0486ed238d712e4b4eb773cc3d3377eb6949da21
SHA5127b78f7b2403e786cfb15d6939116427215c5e24eb9fdc91b7984eb6c28eeced06028f77abefa127f470c25aea5b5194cd9c76323145b59f0774bf19e4db5b5ef
-
MD5
f10bbded98a350baf72a5cb839504e0c
SHA154136661560d6bfc8f4b08cf6433f0305601354b
SHA25697bca00098f561fda785fe2de4065885a64e546a2b6815876c1b6dedfa943493
SHA512f95ef157d7388c20914c3c97fb60e1f6c57c961704cf856275f5d902a278e018ef8767400ecaad7c25bbd851c49d301aa2b204ff41627e68d78ef63494bd06f4
-
MD5
262077d2e49ed9839db8e1612ab89240
SHA133372e2e7f36464f084b1cde90d0c8d5e8017547
SHA256a0ef726a481c99e070530a97670e6349b54bc889dc5e4dc41e54f71171fd3a41
SHA512a2b9c36e23c24cd509ac20d849b2e75f5c702d59c024dc5b8e697db5985f8a552644e014783c8a2ef20a20b4e68f939c560010ce437f43d5293ef3ca3088a55f
-
MD5
259ab7130cd4b96109f48833136c525b
SHA10a2b86f60691a8aa8de14d988d9a87c0890b9098
SHA256012f75cbc635202be0714c16d195d1f751a044b4f162920b77dba13c1237bcac
SHA512fc079c7a59c58f8d777382e895061ab6023f1c96e102e390f1e3b4af3bf9af798a84c63c36fa34daa919094b701a746a9a7cfc5fada3c550c78b1cc7d1c88717
-
MD5
7443efdfe93dd85ed7146284924353a8
SHA1e741ec0bda793f60ebb738aeee12b3eccdcefb30
SHA256c058828b8198b13e63c8c40cbd4213d6df78fb7089c89b9c17b840815662c282
SHA512dda4bbfc2ecb7ee4f10754bc37bceb459353ad5965a6c4a1afa275182133864dcd9c5ab84e23208de89e109ec9ceee8cd74109ee2e61a9594129f03c912f975a
-
MD5
df154f5a8aa82e3d4ea19eeb9cdb1628
SHA14280a44f1942a254ff0b1cf736acf8b4f3c46e8c
SHA2563191a761141771c55467955d63d29ce5fccaaf7beb3f1e33f66b77947b32711f
SHA5124d83d64ba2a48679222d3d8ca0175dcdb0234b608326141ca616fc55c16c69fd401a72b325cb43047b080abdadf86213f3ea319aeca6c3c0910310dd500fad3d
-
MD5
423f7e04ad62b04d65bfeff648c464cc
SHA10c46a28f2725cd6834322f8cedbf159d954dd09b
SHA2562fc024a482c5fd2dd8c93364c5a762ba28df2008fbb96bb9d68e102a7e310463
SHA512cd07a6d4073f67f21bd774f1f071c0bbb842cdaaf7e5c45fed321fac877f1ab4eb694d7b7601ef4f688c624d4255b80ab1504e960332605b0669915d142e5495
-
MD5
df39c1139b41883b7949ff2dd382b079
SHA1fe942c53f1a021c0e6767428109867d0f0966371
SHA2567ab3461ae580dbda1916eb08264e5f1b29cfed3144f5e70039d46ceca0200c0e
SHA512a9ee08a99b64fece0ceba1fcc3ca7272e649503b1cd2724ab29bce42d2723d65f0db526b2e3007987aebc23aef223ae6ae813e9b3e934e059c0cc3093077c856
-
MD5
6c42ed88254d6ae09bda8d81ce2660ea
SHA18459399c36e82a4042595343978016a15cec29f3
SHA2568c23423ec4ae5dc7bb10f73b9d90bfffe24f52937e06ea22a0afc3c2c5ff17aa
SHA512f56886b86883c18f657f3324021fe4d4bd527dfb81c8f9bebb9731804979b9689a3502f4eeaa20c562fdada7f2e34f36d5ba3d81a2a38cd2d32dd84162c1eb48
-
MD5
e5189f59d01b6e8d25d80cbca9146c6a
SHA105f6c3002c64be67eaa613d1599e1d5e712fa218
SHA256bba8c217804e5ee9b74eb3ea8b8d5519946d22c717793a2fa4053b502d1bfe37
SHA5123bdd3bbc5e544c5341a4aa4ba81e89d44e15dfb1313ce1f2b36ed6a28bf89c423b775fb5b49aef18b7d6eef31ba7325a1a1ad04ec95d287496a3451417dc6512
-
MD5
867e6f9901f839638a87372b30f8686c
SHA1ef980a8f84191f25a41af28e4cfa7ffb280e302e
SHA2561322c0bf0958100b5dfd601797665f923ff9d538054101e028df8d1285c69bed
SHA512ec2de62b71524951bac91dcd6dda42e0846cbcb655f266c3e0641af8cb11c30c9eccb23c881a2b735d27b6e85905b4f4cedeed1af5ad88c5d3ef9d728ea2e7d7
-
MD5
afd33a93d27ff6c97d5d086d4b74f82b
SHA14becc99bc754fe2241c49135f8ddf76204f3c38a
SHA2565ca41993c75e4793cc67147987126aca1174735e741063c273954798dc3b99ae
SHA512976fe70f68c118f9ed4f75da7c82c839a1361889f08e9befa811586519bf90f3a7bcfe0198ab4905b167a2eb81f2c1ff568e6ce8f4a2d019052f5d4c6a3a97d8
-
MD5
0f609dd490b21c85e9c8d1db8995e791
SHA130d448d7457818e4404b3b5e2079efa3d8d60bc3
SHA256dfd0f4b821438d8a9277728e42ab58bdc2667aa7173892ffd6ede75a5d5645f5
SHA5129f5951dc5c3b20c3faebb3bd0f8ad5c9ad1eba5dda2e45309d25600b5a8eaab90490fb06057e3c92b4ba89af8a61ae103840db3b23a5bc30b37c32d41487f79e
-
MD5
f050cfe9ded513f1b8e9a4846a0fa3a7
SHA164cb47c16c5636bdc5046107480aa3c7c97a2bf3
SHA256d9402b75daf385ed652cc1d8c3bf7f3ea306fbc16996dead5a8741eff4f54b2f
SHA51241d3b428696c41ac7dcefbd4fe7dbdb21977597fe906fff2e98ffa5a5bf32096bdad8b535aa0af961482d41a6ce843b4354fc7e5a0baf127f96806f2d53efb49
-
MD5
f050cfe9ded513f1b8e9a4846a0fa3a7
SHA164cb47c16c5636bdc5046107480aa3c7c97a2bf3
SHA256d9402b75daf385ed652cc1d8c3bf7f3ea306fbc16996dead5a8741eff4f54b2f
SHA51241d3b428696c41ac7dcefbd4fe7dbdb21977597fe906fff2e98ffa5a5bf32096bdad8b535aa0af961482d41a6ce843b4354fc7e5a0baf127f96806f2d53efb49
-
MD5
65689075a82a08bb797bb9a5cc2932c9
SHA1a13b3baeedc3456bf8a03e6f7fd43b8ccfabc7e2
SHA256803b09f5863b583114d4db7d19ac0c5f64163c0075992bcfc289d27feea3a3ab
SHA51220a1ac3df849e09fe361d0de8c04f9d8598457e95427a30df9ab74316c2644aa30f782b88b171ffadd7be4b6fc85970ec539d003aa1244434be6a12bbb9b6ee6
-
MD5
92dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
MD5
92dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
MD5
8f144bcbcad0417e7823dd8e60218530
SHA19df092a764b8ad278ed574f00d1c065683eef6ac
SHA25639dfa032878743bba8244c73173c263e669131f0084a38f22c52b1383f627ba0
SHA512e093f69030fee17d8b55bde8337d409e8dfb583c97a81ed37425fb72122318d4c1f996d0d1bca28f24182ff5c8afe2be25eadc27951463ddca5c0abceca2a72d
-
MD5
0f609dd490b21c85e9c8d1db8995e791
SHA130d448d7457818e4404b3b5e2079efa3d8d60bc3
SHA256dfd0f4b821438d8a9277728e42ab58bdc2667aa7173892ffd6ede75a5d5645f5
SHA5129f5951dc5c3b20c3faebb3bd0f8ad5c9ad1eba5dda2e45309d25600b5a8eaab90490fb06057e3c92b4ba89af8a61ae103840db3b23a5bc30b37c32d41487f79e
-
MD5
0f609dd490b21c85e9c8d1db8995e791
SHA130d448d7457818e4404b3b5e2079efa3d8d60bc3
SHA256dfd0f4b821438d8a9277728e42ab58bdc2667aa7173892ffd6ede75a5d5645f5
SHA5129f5951dc5c3b20c3faebb3bd0f8ad5c9ad1eba5dda2e45309d25600b5a8eaab90490fb06057e3c92b4ba89af8a61ae103840db3b23a5bc30b37c32d41487f79e
-
MD5
f050cfe9ded513f1b8e9a4846a0fa3a7
SHA164cb47c16c5636bdc5046107480aa3c7c97a2bf3
SHA256d9402b75daf385ed652cc1d8c3bf7f3ea306fbc16996dead5a8741eff4f54b2f
SHA51241d3b428696c41ac7dcefbd4fe7dbdb21977597fe906fff2e98ffa5a5bf32096bdad8b535aa0af961482d41a6ce843b4354fc7e5a0baf127f96806f2d53efb49