Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
18/08/2023, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
25399f0e41aaf52365a410ee252c08b5ed764ca789dec9c884a98b9332953877.exe
Resource
win10-20230703-en
General
-
Target
25399f0e41aaf52365a410ee252c08b5ed764ca789dec9c884a98b9332953877.exe
-
Size
713KB
-
MD5
25deaaac096abb3772d31b62a02a4e63
-
SHA1
25a97793f73850662d7888150d371245c602a75a
-
SHA256
25399f0e41aaf52365a410ee252c08b5ed764ca789dec9c884a98b9332953877
-
SHA512
109fdea3474331820dd5a8268fddc30cc5824850ca085ea9917ba4792c59af40dc58774cf49951782e5de5119d0104bcec84f37eec2f8ad4947bef138f1ca9c0
-
SSDEEP
12288:TMrry908FJKJ/D+b9xKVX/3229ME40deDWJkKRbZXBp7phq1sX15B9HC7T7:kyDGJLcKNf22F44eD5KRZL1piX7
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
dugin
77.91.124.73:19071
-
auth_value
7c3e46e091100fd26a6076996d374c28
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000600000001afb7-156.dat healer behavioral1/files/0x000600000001afb7-155.dat healer behavioral1/memory/4880-157-0x0000000000720000-0x000000000072A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h0299963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h0299963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h0299963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h0299963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h0299963.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 2336 x2663980.exe 4160 x1255550.exe 5084 x2037956.exe 1136 g2905693.exe 1996 saves.exe 4880 h0299963.exe 524 i6122047.exe 2292 saves.exe 800 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 332 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h0299963.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2663980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1255550.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2037956.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 25399f0e41aaf52365a410ee252c08b5ed764ca789dec9c884a98b9332953877.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1052 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4880 h0299963.exe 4880 h0299963.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4880 h0299963.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3988 wrote to memory of 2336 3988 25399f0e41aaf52365a410ee252c08b5ed764ca789dec9c884a98b9332953877.exe 70 PID 3988 wrote to memory of 2336 3988 25399f0e41aaf52365a410ee252c08b5ed764ca789dec9c884a98b9332953877.exe 70 PID 3988 wrote to memory of 2336 3988 25399f0e41aaf52365a410ee252c08b5ed764ca789dec9c884a98b9332953877.exe 70 PID 2336 wrote to memory of 4160 2336 x2663980.exe 71 PID 2336 wrote to memory of 4160 2336 x2663980.exe 71 PID 2336 wrote to memory of 4160 2336 x2663980.exe 71 PID 4160 wrote to memory of 5084 4160 x1255550.exe 72 PID 4160 wrote to memory of 5084 4160 x1255550.exe 72 PID 4160 wrote to memory of 5084 4160 x1255550.exe 72 PID 5084 wrote to memory of 1136 5084 x2037956.exe 73 PID 5084 wrote to memory of 1136 5084 x2037956.exe 73 PID 5084 wrote to memory of 1136 5084 x2037956.exe 73 PID 1136 wrote to memory of 1996 1136 g2905693.exe 74 PID 1136 wrote to memory of 1996 1136 g2905693.exe 74 PID 1136 wrote to memory of 1996 1136 g2905693.exe 74 PID 5084 wrote to memory of 4880 5084 x2037956.exe 75 PID 5084 wrote to memory of 4880 5084 x2037956.exe 75 PID 1996 wrote to memory of 1052 1996 saves.exe 76 PID 1996 wrote to memory of 1052 1996 saves.exe 76 PID 1996 wrote to memory of 1052 1996 saves.exe 76 PID 1996 wrote to memory of 2152 1996 saves.exe 78 PID 1996 wrote to memory of 2152 1996 saves.exe 78 PID 1996 wrote to memory of 2152 1996 saves.exe 78 PID 2152 wrote to memory of 228 2152 cmd.exe 80 PID 2152 wrote to memory of 228 2152 cmd.exe 80 PID 2152 wrote to memory of 228 2152 cmd.exe 80 PID 2152 wrote to memory of 328 2152 cmd.exe 81 PID 2152 wrote to memory of 328 2152 cmd.exe 81 PID 2152 wrote to memory of 328 2152 cmd.exe 81 PID 2152 wrote to memory of 2312 2152 cmd.exe 82 PID 2152 wrote to memory of 2312 2152 cmd.exe 82 PID 2152 wrote to memory of 2312 2152 cmd.exe 82 PID 2152 wrote to memory of 3304 2152 cmd.exe 84 PID 2152 wrote to memory of 3304 2152 cmd.exe 84 PID 2152 wrote to memory of 3304 2152 cmd.exe 84 PID 2152 wrote to memory of 4808 2152 cmd.exe 83 PID 2152 wrote to memory of 4808 2152 cmd.exe 83 PID 2152 wrote to memory of 4808 2152 cmd.exe 83 PID 2152 wrote to memory of 4308 2152 cmd.exe 85 PID 2152 wrote to memory of 4308 2152 cmd.exe 85 PID 2152 wrote to memory of 4308 2152 cmd.exe 85 PID 4160 wrote to memory of 524 4160 x1255550.exe 86 PID 4160 wrote to memory of 524 4160 x1255550.exe 86 PID 4160 wrote to memory of 524 4160 x1255550.exe 86 PID 1996 wrote to memory of 332 1996 saves.exe 88 PID 1996 wrote to memory of 332 1996 saves.exe 88 PID 1996 wrote to memory of 332 1996 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\25399f0e41aaf52365a410ee252c08b5ed764ca789dec9c884a98b9332953877.exe"C:\Users\Admin\AppData\Local\Temp\25399f0e41aaf52365a410ee252c08b5ed764ca789dec9c884a98b9332953877.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2663980.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2663980.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1255550.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1255550.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2037956.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2037956.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2905693.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2905693.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1052
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:228
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:328
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2312
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:4308
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0299963.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h0299963.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6122047.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6122047.exe4⤵
- Executes dropped EXE
PID:524
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2292
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:800
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD5bb693f8186cb0a6c01b075611b3a71e0
SHA177efdc0892ba6fd79c5ea47ec7d3dbd15d5c5b8f
SHA25654fa6d59d3f5af9a44c4f6039dc6612aaa85d95b8d156c6412b6ca48a09382bd
SHA5124d2a9969d383780909291a9ee4e6f803dabcca42c57ee950faaadabaacef359daed8449c20187d5d959ab8af85371fa1ff6f33b422196f2233b511c0377e794c
-
Filesize
598KB
MD5bb693f8186cb0a6c01b075611b3a71e0
SHA177efdc0892ba6fd79c5ea47ec7d3dbd15d5c5b8f
SHA25654fa6d59d3f5af9a44c4f6039dc6612aaa85d95b8d156c6412b6ca48a09382bd
SHA5124d2a9969d383780909291a9ee4e6f803dabcca42c57ee950faaadabaacef359daed8449c20187d5d959ab8af85371fa1ff6f33b422196f2233b511c0377e794c
-
Filesize
432KB
MD55c62e11b0b253d9b2125e1b9c6a99455
SHA10645e13ea2c11a3b7d91fc9b00da4078121abe4e
SHA256624a0fdec5b61053110b786cb1d0112fe970bdb071d6e3d896b232604c0c2c59
SHA512bd182590ff9582ce5ba6f9982f3114d32059fadce3858fcc3446b6aeaec7917cfed28e8ac5ae5037a71e033d8a27506d0097d59f86240bc4bb3ac62598e1965d
-
Filesize
432KB
MD55c62e11b0b253d9b2125e1b9c6a99455
SHA10645e13ea2c11a3b7d91fc9b00da4078121abe4e
SHA256624a0fdec5b61053110b786cb1d0112fe970bdb071d6e3d896b232604c0c2c59
SHA512bd182590ff9582ce5ba6f9982f3114d32059fadce3858fcc3446b6aeaec7917cfed28e8ac5ae5037a71e033d8a27506d0097d59f86240bc4bb3ac62598e1965d
-
Filesize
173KB
MD5c8b93ed5977bcb478f9e7607895bd909
SHA1f2f19a7fa19b6036d907b27c6bb1329df79f13ee
SHA256918f4faf3a6071bcd414e85d7a77422d9eb97870998f2af57695f17101584baf
SHA51273bcab7b27eb08a10553e14251c1490aa1f6bb7f81a206bbf99adf676690b56105d10013021e4951207905e93fc3ff5f4ad609c12a7cd55bdca1882f5fe54077
-
Filesize
173KB
MD5c8b93ed5977bcb478f9e7607895bd909
SHA1f2f19a7fa19b6036d907b27c6bb1329df79f13ee
SHA256918f4faf3a6071bcd414e85d7a77422d9eb97870998f2af57695f17101584baf
SHA51273bcab7b27eb08a10553e14251c1490aa1f6bb7f81a206bbf99adf676690b56105d10013021e4951207905e93fc3ff5f4ad609c12a7cd55bdca1882f5fe54077
-
Filesize
276KB
MD5c3048f6ee7c1355d234bb82447c84bb2
SHA1e24ce213da2f4c73ce081941635644cc87a546a5
SHA25619b65b103d4727fe792a3def0030be0438c71520ffe17d1725d6636bcd76fb56
SHA51227857192876e8b6bcfa7c0e46f6d3ac6936d9c95037e906067309023269b249fb7cb8216762657201dc7ddbcb17ab062f86ff3c7355ffd80e33c373e46cd72fa
-
Filesize
276KB
MD5c3048f6ee7c1355d234bb82447c84bb2
SHA1e24ce213da2f4c73ce081941635644cc87a546a5
SHA25619b65b103d4727fe792a3def0030be0438c71520ffe17d1725d6636bcd76fb56
SHA51227857192876e8b6bcfa7c0e46f6d3ac6936d9c95037e906067309023269b249fb7cb8216762657201dc7ddbcb17ab062f86ff3c7355ffd80e33c373e46cd72fa
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b