Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
28-08-2023 01:02
Static task
static1
Behavioral task
behavioral1
Sample
cfcb8cf5593b3339ca32c152657b9af5163b56ce9f2589dd3ffed2784d617935.exe
Resource
win10-20230703-en
General
-
Target
cfcb8cf5593b3339ca32c152657b9af5163b56ce9f2589dd3ffed2784d617935.exe
-
Size
704KB
-
MD5
7182c7a30f59a108aafc949648f86db4
-
SHA1
8aa69d4487f925cea0e701018a834e343430b37f
-
SHA256
cfcb8cf5593b3339ca32c152657b9af5163b56ce9f2589dd3ffed2784d617935
-
SHA512
9a541280c7ff94f74686c87003753f08a4368f3f262c587497305d8f8769fd760d646ef345d6a6a2a9028a9f315c182060c25dc9403e051d34705cc5e49ac6ea
-
SSDEEP
12288:7Mr7y90YlsyF1BiA4/EqPAwci+jNy7Jg8XqsEPzLvsZe1lPNuig/20SoKLf0Y1hr:Iyhs4TiAwVAPXjAdf7EPzLvsZe1lDU23
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afe6-26.dat healer behavioral1/files/0x000700000001afe6-27.dat healer behavioral1/memory/3000-28-0x0000000000150000-0x000000000015A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g7473333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g7473333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g7473333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g7473333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g7473333.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 2768 x7135930.exe 3848 x2308936.exe 4536 x1375405.exe 3000 g7473333.exe 4860 h8962217.exe 3116 saves.exe 3648 i3394508.exe 3324 saves.exe 4648 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 988 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" g7473333.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7135930.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2308936.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1375405.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cfcb8cf5593b3339ca32c152657b9af5163b56ce9f2589dd3ffed2784d617935.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3000 g7473333.exe 3000 g7473333.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3000 g7473333.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 3300 wrote to memory of 2768 3300 cfcb8cf5593b3339ca32c152657b9af5163b56ce9f2589dd3ffed2784d617935.exe 69 PID 3300 wrote to memory of 2768 3300 cfcb8cf5593b3339ca32c152657b9af5163b56ce9f2589dd3ffed2784d617935.exe 69 PID 3300 wrote to memory of 2768 3300 cfcb8cf5593b3339ca32c152657b9af5163b56ce9f2589dd3ffed2784d617935.exe 69 PID 2768 wrote to memory of 3848 2768 x7135930.exe 70 PID 2768 wrote to memory of 3848 2768 x7135930.exe 70 PID 2768 wrote to memory of 3848 2768 x7135930.exe 70 PID 3848 wrote to memory of 4536 3848 x2308936.exe 71 PID 3848 wrote to memory of 4536 3848 x2308936.exe 71 PID 3848 wrote to memory of 4536 3848 x2308936.exe 71 PID 4536 wrote to memory of 3000 4536 x1375405.exe 72 PID 4536 wrote to memory of 3000 4536 x1375405.exe 72 PID 4536 wrote to memory of 4860 4536 x1375405.exe 73 PID 4536 wrote to memory of 4860 4536 x1375405.exe 73 PID 4536 wrote to memory of 4860 4536 x1375405.exe 73 PID 4860 wrote to memory of 3116 4860 h8962217.exe 74 PID 4860 wrote to memory of 3116 4860 h8962217.exe 74 PID 4860 wrote to memory of 3116 4860 h8962217.exe 74 PID 3848 wrote to memory of 3648 3848 x2308936.exe 75 PID 3848 wrote to memory of 3648 3848 x2308936.exe 75 PID 3848 wrote to memory of 3648 3848 x2308936.exe 75 PID 3116 wrote to memory of 4676 3116 saves.exe 76 PID 3116 wrote to memory of 4676 3116 saves.exe 76 PID 3116 wrote to memory of 4676 3116 saves.exe 76 PID 3116 wrote to memory of 4576 3116 saves.exe 77 PID 3116 wrote to memory of 4576 3116 saves.exe 77 PID 3116 wrote to memory of 4576 3116 saves.exe 77 PID 4576 wrote to memory of 640 4576 cmd.exe 81 PID 4576 wrote to memory of 640 4576 cmd.exe 81 PID 4576 wrote to memory of 640 4576 cmd.exe 81 PID 4576 wrote to memory of 4896 4576 cmd.exe 80 PID 4576 wrote to memory of 4896 4576 cmd.exe 80 PID 4576 wrote to memory of 4896 4576 cmd.exe 80 PID 4576 wrote to memory of 4376 4576 cmd.exe 82 PID 4576 wrote to memory of 4376 4576 cmd.exe 82 PID 4576 wrote to memory of 4376 4576 cmd.exe 82 PID 4576 wrote to memory of 2260 4576 cmd.exe 83 PID 4576 wrote to memory of 2260 4576 cmd.exe 83 PID 4576 wrote to memory of 2260 4576 cmd.exe 83 PID 4576 wrote to memory of 4084 4576 cmd.exe 84 PID 4576 wrote to memory of 4084 4576 cmd.exe 84 PID 4576 wrote to memory of 4084 4576 cmd.exe 84 PID 4576 wrote to memory of 5076 4576 cmd.exe 85 PID 4576 wrote to memory of 5076 4576 cmd.exe 85 PID 4576 wrote to memory of 5076 4576 cmd.exe 85 PID 3116 wrote to memory of 988 3116 saves.exe 87 PID 3116 wrote to memory of 988 3116 saves.exe 87 PID 3116 wrote to memory of 988 3116 saves.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfcb8cf5593b3339ca32c152657b9af5163b56ce9f2589dd3ffed2784d617935.exe"C:\Users\Admin\AppData\Local\Temp\cfcb8cf5593b3339ca32c152657b9af5163b56ce9f2589dd3ffed2784d617935.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7135930.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7135930.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2308936.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2308936.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1375405.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1375405.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7473333.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7473333.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8962217.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8962217.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:640
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2260
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4084
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:5076
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:988
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i3394508.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i3394508.exe4⤵
- Executes dropped EXE
PID:3648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3324
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4648
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
599KB
MD5a344b42dc2303932874755d67e68bffe
SHA12a116eb36128048b98ea191823ddac64c6f47b75
SHA256ee69c497a6068b6869bde4d06ce6394600cbbe78e95d720cd157a64c37ec9d28
SHA5125585f1ec93268805be23dedeb7cd0d441af1bc1bd38837c53aa8a196a72f3d2c262a8190f44eb3210f20013f93566ff11939238970c3e4e27c3374c54d13e887
-
Filesize
599KB
MD5a344b42dc2303932874755d67e68bffe
SHA12a116eb36128048b98ea191823ddac64c6f47b75
SHA256ee69c497a6068b6869bde4d06ce6394600cbbe78e95d720cd157a64c37ec9d28
SHA5125585f1ec93268805be23dedeb7cd0d441af1bc1bd38837c53aa8a196a72f3d2c262a8190f44eb3210f20013f93566ff11939238970c3e4e27c3374c54d13e887
-
Filesize
433KB
MD5d6f264aade51ebc67134d815d3a8c1f1
SHA1f0258597dee0661d6f28c3b05b4b7576385fa68f
SHA256f2015b696a908c3c6421f5f1e0342443976de743f825945e0c88bd6b2efec844
SHA51247f8232446a4e8a713a8d4575b920518d59aa206a4ace3e72b7ebe41251f577fa933e7e2cce057d57c6ceb4aa8c5c16030b255311a62b65b1c31bbd5a831a504
-
Filesize
433KB
MD5d6f264aade51ebc67134d815d3a8c1f1
SHA1f0258597dee0661d6f28c3b05b4b7576385fa68f
SHA256f2015b696a908c3c6421f5f1e0342443976de743f825945e0c88bd6b2efec844
SHA51247f8232446a4e8a713a8d4575b920518d59aa206a4ace3e72b7ebe41251f577fa933e7e2cce057d57c6ceb4aa8c5c16030b255311a62b65b1c31bbd5a831a504
-
Filesize
174KB
MD5eadea56f1dc35e39c0193ae74169cd6e
SHA13ac6e379b6130ef222df605b83d91988d86639d8
SHA256e74302f75a12032e0186e88af225a06f947b760ef61362187ff65b9ede091c74
SHA512e616f905dd2befde278cbed4c3ce3626193bf8c088afc2432ce8122933e88356a9c3c8f0bfd806f535ae292bf22bf85dad83cb934b0632f8c98a3fba2a493dc8
-
Filesize
174KB
MD5eadea56f1dc35e39c0193ae74169cd6e
SHA13ac6e379b6130ef222df605b83d91988d86639d8
SHA256e74302f75a12032e0186e88af225a06f947b760ef61362187ff65b9ede091c74
SHA512e616f905dd2befde278cbed4c3ce3626193bf8c088afc2432ce8122933e88356a9c3c8f0bfd806f535ae292bf22bf85dad83cb934b0632f8c98a3fba2a493dc8
-
Filesize
277KB
MD5d0bbd7a3ea2c4c19bb789cf3eca3d341
SHA19f50caa59e8a3551508488ef7b9899751fe317a6
SHA2569a937b0dfe09dc26fe02b5ebc78a24d68ef6b15fc0839f0110fa404fd12e017a
SHA5124026ac94ace9174d9234471858f71647568230b11f9f2d0afcaa18ccdf03b33f3d438e0b8143fa3b449eb3d76bcc45b080fe1b46788bb1f55425061022c77534
-
Filesize
277KB
MD5d0bbd7a3ea2c4c19bb789cf3eca3d341
SHA19f50caa59e8a3551508488ef7b9899751fe317a6
SHA2569a937b0dfe09dc26fe02b5ebc78a24d68ef6b15fc0839f0110fa404fd12e017a
SHA5124026ac94ace9174d9234471858f71647568230b11f9f2d0afcaa18ccdf03b33f3d438e0b8143fa3b449eb3d76bcc45b080fe1b46788bb1f55425061022c77534
-
Filesize
15KB
MD58f5ef06d72d9cb9f4d3d053169f13ac6
SHA1b85ab9b94e072b3ece17f6a85cffff691fe9edf1
SHA256ebfac8cccaefd6c02ed2a16aa3e00f3c2282a103f7146fa243059d10f251df09
SHA5122a22bf7ba357710184432f429cd429d7253a4cf0137555b1742df29ba48dedaa9794493ae6ddedee06508bcace1eedbb3793579baabbc2ad356376380ab14812
-
Filesize
15KB
MD58f5ef06d72d9cb9f4d3d053169f13ac6
SHA1b85ab9b94e072b3ece17f6a85cffff691fe9edf1
SHA256ebfac8cccaefd6c02ed2a16aa3e00f3c2282a103f7146fa243059d10f251df09
SHA5122a22bf7ba357710184432f429cd429d7253a4cf0137555b1742df29ba48dedaa9794493ae6ddedee06508bcace1eedbb3793579baabbc2ad356376380ab14812
-
Filesize
323KB
MD563ea78ef46c4a7a7a4f6322c5338cbe1
SHA12f6723601d06556558b773497bd21cb0f22d5702
SHA25695d7feb6e63f84cbc989b3de456e6dbc31ab6f70a570eda580d10e4c733b4f25
SHA5122d64a4940a80b8a69b2a8a4fecf9a9bc0007a4e6eafd8ffdf65c5d6fa2480ae88730c1b095081d8e6fafbb8c40f7188a9974111d60e13b9d0d63ea2203f02398
-
Filesize
323KB
MD563ea78ef46c4a7a7a4f6322c5338cbe1
SHA12f6723601d06556558b773497bd21cb0f22d5702
SHA25695d7feb6e63f84cbc989b3de456e6dbc31ab6f70a570eda580d10e4c733b4f25
SHA5122d64a4940a80b8a69b2a8a4fecf9a9bc0007a4e6eafd8ffdf65c5d6fa2480ae88730c1b095081d8e6fafbb8c40f7188a9974111d60e13b9d0d63ea2203f02398
-
Filesize
323KB
MD563ea78ef46c4a7a7a4f6322c5338cbe1
SHA12f6723601d06556558b773497bd21cb0f22d5702
SHA25695d7feb6e63f84cbc989b3de456e6dbc31ab6f70a570eda580d10e4c733b4f25
SHA5122d64a4940a80b8a69b2a8a4fecf9a9bc0007a4e6eafd8ffdf65c5d6fa2480ae88730c1b095081d8e6fafbb8c40f7188a9974111d60e13b9d0d63ea2203f02398
-
Filesize
323KB
MD563ea78ef46c4a7a7a4f6322c5338cbe1
SHA12f6723601d06556558b773497bd21cb0f22d5702
SHA25695d7feb6e63f84cbc989b3de456e6dbc31ab6f70a570eda580d10e4c733b4f25
SHA5122d64a4940a80b8a69b2a8a4fecf9a9bc0007a4e6eafd8ffdf65c5d6fa2480ae88730c1b095081d8e6fafbb8c40f7188a9974111d60e13b9d0d63ea2203f02398
-
Filesize
323KB
MD563ea78ef46c4a7a7a4f6322c5338cbe1
SHA12f6723601d06556558b773497bd21cb0f22d5702
SHA25695d7feb6e63f84cbc989b3de456e6dbc31ab6f70a570eda580d10e4c733b4f25
SHA5122d64a4940a80b8a69b2a8a4fecf9a9bc0007a4e6eafd8ffdf65c5d6fa2480ae88730c1b095081d8e6fafbb8c40f7188a9974111d60e13b9d0d63ea2203f02398
-
Filesize
323KB
MD563ea78ef46c4a7a7a4f6322c5338cbe1
SHA12f6723601d06556558b773497bd21cb0f22d5702
SHA25695d7feb6e63f84cbc989b3de456e6dbc31ab6f70a570eda580d10e4c733b4f25
SHA5122d64a4940a80b8a69b2a8a4fecf9a9bc0007a4e6eafd8ffdf65c5d6fa2480ae88730c1b095081d8e6fafbb8c40f7188a9974111d60e13b9d0d63ea2203f02398
-
Filesize
323KB
MD563ea78ef46c4a7a7a4f6322c5338cbe1
SHA12f6723601d06556558b773497bd21cb0f22d5702
SHA25695d7feb6e63f84cbc989b3de456e6dbc31ab6f70a570eda580d10e4c733b4f25
SHA5122d64a4940a80b8a69b2a8a4fecf9a9bc0007a4e6eafd8ffdf65c5d6fa2480ae88730c1b095081d8e6fafbb8c40f7188a9974111d60e13b9d0d63ea2203f02398
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b