Analysis
-
max time kernel
63s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 15:03
Static task
static1
Behavioral task
behavioral1
Sample
4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe
Resource
win7-20220812-en
General
-
Target
4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe
-
Size
1.0MB
-
MD5
3bc343997607a36dd36f9ec2937422dc
-
SHA1
7336da33e47005bc66b94b67c7cdbc3f10a4f037
-
SHA256
4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b
-
SHA512
98df7358181114c02e92f31fd989a7ac4c5885bfbfbd2a4a13a4c4be2c9d25ea31482fad9aed1db3cc48953fe01589b4640239ba370d16399631c2ad285a04e6
-
SSDEEP
24576:UUOQIjxJxqW6ZvNrryeq7Xr8N9bb3DFsH:5WjxJEWstyewkb7ZsH
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
6c209c.exedescription ioc process File created C:\Windows\SysWOW64\drivers\34baa525.sys 6c209c.exe -
Executes dropped EXE 3 IoCs
Processes:
6c196b.tmp4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe6c209c.exepid process 896 6c196b.tmp 480 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe 1500 6c209c.exe -
Possible privilege escalation attempt 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 392 takeown.exe 1824 icacls.exe 1476 takeown.exe 1676 icacls.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
6c209c.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\34baa525\ImagePath = "\\??\\C:\\Windows\\SysWOW64\\drivers\\34baa525.sys" 6c209c.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe upx \Users\Admin\AppData\Local\Temp\4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe upx C:\Users\Admin\AppData\Local\Temp\4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe upx behavioral1/memory/480-73-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/480-77-0x0000000000400000-0x000000000048C000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
6c196b.tmppid process 896 6c196b.tmp -
Loads dropped DLL 6 IoCs
Processes:
4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe6c196b.tmppid process 2004 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe 2004 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe 896 6c196b.tmp 896 6c196b.tmp 896 6c196b.tmp 896 6c196b.tmp -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 392 takeown.exe 1824 icacls.exe 1476 takeown.exe 1676 icacls.exe -
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
6c209c.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} 6c209c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} 6c209c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} 6c209c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects 6c209c.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
6c209c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 6c209c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 6c209c.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 6c209c.exe -
Drops file in System32 directory 4 IoCs
Processes:
6c209c.exedescription ioc process File created C:\Windows\SysWOW64\ws2tcpip.dll 6c209c.exe File opened for modification C:\Windows\SysWOW64\ws2tcpip.dll 6c209c.exe File created C:\Windows\SysWOW64\wshtcpip.dll 6c209c.exe File created C:\Windows\SysWOW64\midimap.dll 6c209c.exe -
Modifies registry class 4 IoCs
Processes:
6c209c.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\HOOK_ID 6c209c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\HOOK_ID\name = "6c209c.exe" 6c209c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\SYS_DLL 6c209c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\SYS_DLL\name = "uagfoRy.dll" 6c209c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6c209c.exepid process 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe 1500 6c209c.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
6c209c.exepid process 460 1500 6c209c.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
6c209c.exetakeown.exetakeown.exedescription pid process Token: SeDebugPrivilege 1500 6c209c.exe Token: SeTakeOwnershipPrivilege 392 takeown.exe Token: SeTakeOwnershipPrivilege 1476 takeown.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exepid process 480 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe 480 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe 480 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe 480 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe 480 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exepid process 480 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe 480 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe 480 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe 480 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe 480 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe6c196b.tmp6c209c.execmd.execmd.exedescription pid process target process PID 2004 wrote to memory of 896 2004 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe 6c196b.tmp PID 2004 wrote to memory of 896 2004 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe 6c196b.tmp PID 2004 wrote to memory of 896 2004 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe 6c196b.tmp PID 2004 wrote to memory of 896 2004 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe 6c196b.tmp PID 896 wrote to memory of 480 896 6c196b.tmp 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe PID 896 wrote to memory of 480 896 6c196b.tmp 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe PID 896 wrote to memory of 480 896 6c196b.tmp 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe PID 896 wrote to memory of 480 896 6c196b.tmp 4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe PID 896 wrote to memory of 1500 896 6c196b.tmp 6c209c.exe PID 896 wrote to memory of 1500 896 6c196b.tmp 6c209c.exe PID 896 wrote to memory of 1500 896 6c196b.tmp 6c209c.exe PID 896 wrote to memory of 1500 896 6c196b.tmp 6c209c.exe PID 1500 wrote to memory of 1684 1500 6c209c.exe cmd.exe PID 1500 wrote to memory of 1684 1500 6c209c.exe cmd.exe PID 1500 wrote to memory of 1684 1500 6c209c.exe cmd.exe PID 1500 wrote to memory of 1684 1500 6c209c.exe cmd.exe PID 1684 wrote to memory of 392 1684 cmd.exe takeown.exe PID 1684 wrote to memory of 392 1684 cmd.exe takeown.exe PID 1684 wrote to memory of 392 1684 cmd.exe takeown.exe PID 1684 wrote to memory of 392 1684 cmd.exe takeown.exe PID 1684 wrote to memory of 1824 1684 cmd.exe icacls.exe PID 1684 wrote to memory of 1824 1684 cmd.exe icacls.exe PID 1684 wrote to memory of 1824 1684 cmd.exe icacls.exe PID 1684 wrote to memory of 1824 1684 cmd.exe icacls.exe PID 1500 wrote to memory of 1724 1500 6c209c.exe cmd.exe PID 1500 wrote to memory of 1724 1500 6c209c.exe cmd.exe PID 1500 wrote to memory of 1724 1500 6c209c.exe cmd.exe PID 1500 wrote to memory of 1724 1500 6c209c.exe cmd.exe PID 1724 wrote to memory of 1476 1724 cmd.exe takeown.exe PID 1724 wrote to memory of 1476 1724 cmd.exe takeown.exe PID 1724 wrote to memory of 1476 1724 cmd.exe takeown.exe PID 1724 wrote to memory of 1476 1724 cmd.exe takeown.exe PID 1724 wrote to memory of 1676 1724 cmd.exe icacls.exe PID 1724 wrote to memory of 1676 1724 cmd.exe icacls.exe PID 1724 wrote to memory of 1676 1724 cmd.exe icacls.exe PID 1724 wrote to memory of 1676 1724 cmd.exe icacls.exe PID 1500 wrote to memory of 304 1500 6c209c.exe cmd.exe PID 1500 wrote to memory of 304 1500 6c209c.exe cmd.exe PID 1500 wrote to memory of 304 1500 6c209c.exe cmd.exe PID 1500 wrote to memory of 304 1500 6c209c.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe"C:\Users\Admin\AppData\Local\Temp\4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\6c196b.tmp>C:\Users\Admin\AppData\Local\Temp\4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Local\Temp\4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe"C:\Users\Admin\AppData\Local\Temp\4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:480 -
C:\Users\Admin\AppData\Local\Temp\6c209c.exe"C:\Users\Admin\AppData\Local\Temp\\6c209c.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Sets service image path in registry
- Installs/modifies Browser Helper Object
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\wshtcpip.dll && icacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F4⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\wshtcpip.dll5⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:392 -
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\wshtcpip.dll /grant administrators:F5⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1824 -
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f C:\Windows\SysWOW64\midimap.dll && icacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F4⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\takeown.exetakeown /f C:\Windows\SysWOW64\midimap.dll5⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1476 -
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\SysWOW64\midimap.dll /grant administrators:F5⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ahnmove.bat4⤵PID:304
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe
Filesize196KB
MD594ae8aae4c9f1fbf472a5a4df0abe9f3
SHA11fbc740ace3e4c2343097738c6eed8ab4a66eb0f
SHA256b3d53992dfb5f031d7a7f7b93e0528090fe9788dc2ed5d2405b1afe50ea146c7
SHA5123996ea4dd6dffe4b3e92f3c4ec22f581b0985292024efe285c8ff5070ef9e90653c1cb91365a5846f8e4e7eafe7e681fd977400c49c9ebc72f43b7fee4295b7e
-
Filesize
1.0MB
MD53bc343997607a36dd36f9ec2937422dc
SHA17336da33e47005bc66b94b67c7cdbc3f10a4f037
SHA2564bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b
SHA51298df7358181114c02e92f31fd989a7ac4c5885bfbfbd2a4a13a4c4be2c9d25ea31482fad9aed1db3cc48953fe01589b4640239ba370d16399631c2ad285a04e6
-
Filesize
1.0MB
MD53bc343997607a36dd36f9ec2937422dc
SHA17336da33e47005bc66b94b67c7cdbc3f10a4f037
SHA2564bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b
SHA51298df7358181114c02e92f31fd989a7ac4c5885bfbfbd2a4a13a4c4be2c9d25ea31482fad9aed1db3cc48953fe01589b4640239ba370d16399631c2ad285a04e6
-
Filesize
846KB
MD5ba68d4c5343746d9bcf3cbadad3ba564
SHA13c23f9c71854c070203f45b9775b6b74d9a8658f
SHA25663077e0732540d09c8c64c68239a213b910b2182de1d9893c51f8ef0bde5c32c
SHA5127ee9b012c2ed8abe9be931ea9b1d927f6b9f948fe98cc3856a4a34be1fd1699bd4c47ad09694e5cdbb5c57da8f6160fcc6c6196a79c920eabc356ade4b6e90e9
-
Filesize
846KB
MD5ba68d4c5343746d9bcf3cbadad3ba564
SHA13c23f9c71854c070203f45b9775b6b74d9a8658f
SHA25663077e0732540d09c8c64c68239a213b910b2182de1d9893c51f8ef0bde5c32c
SHA5127ee9b012c2ed8abe9be931ea9b1d927f6b9f948fe98cc3856a4a34be1fd1699bd4c47ad09694e5cdbb5c57da8f6160fcc6c6196a79c920eabc356ade4b6e90e9
-
Filesize
177B
MD514943d26316579c59ffd1ac1fc093af2
SHA1907a596551e3009b73f98d19c757fcf2ff623a62
SHA2567de3cbe61d416b9d8587aa46bf242367f3c473a0f67744705f288e01a28f3a8b
SHA512c64dfc1b9c561d3fa244f3f28dea2d4a587b112e692556c7e7e725e4c468259952329813f96a80ccbed9ba842c2ccbe4cc2558d148a203a861cd183527385fb9
-
\Users\Admin\AppData\Local\Temp\4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe
Filesize196KB
MD594ae8aae4c9f1fbf472a5a4df0abe9f3
SHA11fbc740ace3e4c2343097738c6eed8ab4a66eb0f
SHA256b3d53992dfb5f031d7a7f7b93e0528090fe9788dc2ed5d2405b1afe50ea146c7
SHA5123996ea4dd6dffe4b3e92f3c4ec22f581b0985292024efe285c8ff5070ef9e90653c1cb91365a5846f8e4e7eafe7e681fd977400c49c9ebc72f43b7fee4295b7e
-
\Users\Admin\AppData\Local\Temp\4bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b.exe
Filesize196KB
MD594ae8aae4c9f1fbf472a5a4df0abe9f3
SHA11fbc740ace3e4c2343097738c6eed8ab4a66eb0f
SHA256b3d53992dfb5f031d7a7f7b93e0528090fe9788dc2ed5d2405b1afe50ea146c7
SHA5123996ea4dd6dffe4b3e92f3c4ec22f581b0985292024efe285c8ff5070ef9e90653c1cb91365a5846f8e4e7eafe7e681fd977400c49c9ebc72f43b7fee4295b7e
-
Filesize
1.0MB
MD53bc343997607a36dd36f9ec2937422dc
SHA17336da33e47005bc66b94b67c7cdbc3f10a4f037
SHA2564bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b
SHA51298df7358181114c02e92f31fd989a7ac4c5885bfbfbd2a4a13a4c4be2c9d25ea31482fad9aed1db3cc48953fe01589b4640239ba370d16399631c2ad285a04e6
-
Filesize
1.0MB
MD53bc343997607a36dd36f9ec2937422dc
SHA17336da33e47005bc66b94b67c7cdbc3f10a4f037
SHA2564bcee96b572888f92d70cdc796b65fff18947ec6b59e5eeb6636f66c3442a96b
SHA51298df7358181114c02e92f31fd989a7ac4c5885bfbfbd2a4a13a4c4be2c9d25ea31482fad9aed1db3cc48953fe01589b4640239ba370d16399631c2ad285a04e6
-
Filesize
846KB
MD5ba68d4c5343746d9bcf3cbadad3ba564
SHA13c23f9c71854c070203f45b9775b6b74d9a8658f
SHA25663077e0732540d09c8c64c68239a213b910b2182de1d9893c51f8ef0bde5c32c
SHA5127ee9b012c2ed8abe9be931ea9b1d927f6b9f948fe98cc3856a4a34be1fd1699bd4c47ad09694e5cdbb5c57da8f6160fcc6c6196a79c920eabc356ade4b6e90e9
-
Filesize
846KB
MD5ba68d4c5343746d9bcf3cbadad3ba564
SHA13c23f9c71854c070203f45b9775b6b74d9a8658f
SHA25663077e0732540d09c8c64c68239a213b910b2182de1d9893c51f8ef0bde5c32c
SHA5127ee9b012c2ed8abe9be931ea9b1d927f6b9f948fe98cc3856a4a34be1fd1699bd4c47ad09694e5cdbb5c57da8f6160fcc6c6196a79c920eabc356ade4b6e90e9