Analysis
-
max time kernel
67s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 23:56
Static task
static1
Behavioral task
behavioral1
Sample
44a9a4aab2226603cc8ad4d81dc299fa.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
44a9a4aab2226603cc8ad4d81dc299fa.exe
Resource
win10v2004-20231215-en
General
-
Target
44a9a4aab2226603cc8ad4d81dc299fa.exe
-
Size
2.5MB
-
MD5
44a9a4aab2226603cc8ad4d81dc299fa
-
SHA1
ea9219503ca35162bec9304210f77f13c77fd176
-
SHA256
79f736fc40140c0c94b2da2ec99a437ad827adec22af45ecb8a9af924fa4a739
-
SHA512
e2d02c2f73b7dede45c97630fef051b118ffba012c2e5c45a590bd96e2281fe7acf3bccf0dfbbfba0dc386daa10ed1dbdbcfa2c050d05c8199dd771a3da5a2d0
-
SSDEEP
49152:rx+1KHkoWgtR4BY8Z9oTIAdjLLnuPh0wkNQjYiGKmXAvWMPbD67aSZcXw7T7e:rxuekByRGKdjLDuZ0wJjNIMWMPS7Biwy
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2636 netsh.exe -
Executes dropped EXE 7 IoCs
pid Process 2868 CfosSpeed 4.50 .silverado96..exe 4136 CfosSpeed 4.50 .silverado96..exe 3952 setup.exe 2188 Server.exe 3776 Server.exe 2552 Socks.exe 364 Socks.exe -
Loads dropped DLL 4 IoCs
pid Process 2188 Server.exe 3776 Server.exe 2552 Socks.exe 364 Socks.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinsysMon = "C:\\Windows\\SysWOW64\\Socks.exe" reg.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MSWINSCK.OCX Server.exe File created C:\Windows\SysWOW64\MSWINSCK.OCX Server.exe File opened for modification C:\Windows\SysWOW64\socklink.txt Server.exe File created C:\Windows\SysWOW64\Socks.exe Server.exe File created C:\Windows\SysWOW64\MSWINSCK.OCX Server.exe File created C:\Windows\SysWOW64\socklink.txt Server.exe File opened for modification C:\Windows\SysWOW64\Socks.exe Server.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\cFosSpeed_Setup_Log.txt setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023208-4.dat nsis_installer_2 behavioral2/files/0x0008000000023208-3.dat nsis_installer_2 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer\ = "MSWinsock.Winsock.1" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version\ = "1.0" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1 Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\ = "Winsock General Property Page Object" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ThreadingModel = "Apartment" Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1 Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1 Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID\ = "MSWinsock.Winsock" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ = "Microsoft WinSock Control, version 6.0" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ThreadingModel = "Apartment" Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Control Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ = "Microsoft WinSock Control, version 6.0" Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\ = "Microsoft WinSock Control, version 6.0" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1 Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ = "IMSWinsockControl" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\ = "0" Server.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3440 reg.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2552 Socks.exe 364 Socks.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3704 wrote to memory of 2868 3704 44a9a4aab2226603cc8ad4d81dc299fa.exe 19 PID 3704 wrote to memory of 2868 3704 44a9a4aab2226603cc8ad4d81dc299fa.exe 19 PID 3704 wrote to memory of 2868 3704 44a9a4aab2226603cc8ad4d81dc299fa.exe 19 PID 2868 wrote to memory of 4136 2868 CfosSpeed 4.50 .silverado96..exe 20 PID 2868 wrote to memory of 4136 2868 CfosSpeed 4.50 .silverado96..exe 20 PID 2868 wrote to memory of 4136 2868 CfosSpeed 4.50 .silverado96..exe 20 PID 4136 wrote to memory of 3952 4136 CfosSpeed 4.50 .silverado96..exe 23 PID 4136 wrote to memory of 3952 4136 CfosSpeed 4.50 .silverado96..exe 23 PID 4136 wrote to memory of 3952 4136 CfosSpeed 4.50 .silverado96..exe 23 PID 2868 wrote to memory of 2188 2868 CfosSpeed 4.50 .silverado96..exe 110 PID 2868 wrote to memory of 2188 2868 CfosSpeed 4.50 .silverado96..exe 110 PID 2868 wrote to memory of 2188 2868 CfosSpeed 4.50 .silverado96..exe 110 PID 3704 wrote to memory of 3776 3704 44a9a4aab2226603cc8ad4d81dc299fa.exe 109 PID 3704 wrote to memory of 3776 3704 44a9a4aab2226603cc8ad4d81dc299fa.exe 109 PID 3704 wrote to memory of 3776 3704 44a9a4aab2226603cc8ad4d81dc299fa.exe 109 PID 3776 wrote to memory of 2552 3776 Server.exe 107 PID 3776 wrote to memory of 2552 3776 Server.exe 107 PID 3776 wrote to memory of 2552 3776 Server.exe 107 PID 2188 wrote to memory of 364 2188 Server.exe 108 PID 2188 wrote to memory of 364 2188 Server.exe 108 PID 2188 wrote to memory of 364 2188 Server.exe 108 PID 2552 wrote to memory of 3740 2552 Socks.exe 106 PID 2552 wrote to memory of 3740 2552 Socks.exe 106 PID 2552 wrote to memory of 3740 2552 Socks.exe 106 PID 2552 wrote to memory of 2636 2552 Socks.exe 105 PID 2552 wrote to memory of 2636 2552 Socks.exe 105 PID 2552 wrote to memory of 2636 2552 Socks.exe 105 PID 2552 wrote to memory of 1744 2552 Socks.exe 104 PID 2552 wrote to memory of 1744 2552 Socks.exe 104 PID 2552 wrote to memory of 1744 2552 Socks.exe 104 PID 3740 wrote to memory of 3196 3740 net.exe 102 PID 3740 wrote to memory of 3196 3740 net.exe 102 PID 3740 wrote to memory of 3196 3740 net.exe 102 PID 1744 wrote to memory of 3440 1744 cmd.exe 101 PID 1744 wrote to memory of 3440 1744 cmd.exe 101 PID 1744 wrote to memory of 3440 1744 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\44a9a4aab2226603cc8ad4d81dc299fa.exe"C:\Users\Admin\AppData\Local\Temp\44a9a4aab2226603cc8ad4d81dc299fa.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\nsg4A77.tmp\CfosSpeed 4.50 .silverado96..exe"C:\Users\Admin\AppData\Local\Temp\nsg4A77.tmp\CfosSpeed 4.50 .silverado96..exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\nsm4AE5.tmp\CfosSpeed 4.50 .silverado96..exe"C:\Users\Admin\AppData\Local\Temp\nsm4AE5.tmp\CfosSpeed 4.50 .silverado96..exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\$cfsfx.0\setup.exe"C:\Users\Admin\AppData\Local\Temp\$cfsfx.0\setup.exe" -parentdir:"C:\Users\Admin\AppData\Local\Temp\nsm4AE5.tmp\"4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3952
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsm4AE5.tmp\Server.exeC:\Users\Admin\AppData\Local\Temp\nsm4AE5.tmp\Server.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2188
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsg4A77.tmp\Server.exeC:\Users\Admin\AppData\Local\Temp\nsg4A77.tmp\Server.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3776
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v WinsysMon /t REG_SZ /d "C:\Windows\SysWOW64\Socks.exe" /f1⤵
- Adds Run key to start application
- Modifies registry key
PID:3440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc1⤵PID:3196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\hi.bat1⤵
- Suspicious use of WriteProcessMemory
PID:1744
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set service type = upnp mode = enable1⤵
- Modifies Windows Firewall
PID:2636
-
C:\Windows\SysWOW64\net.exenet stop wscsvc1⤵
- Suspicious use of WriteProcessMemory
PID:3740
-
C:\Windows\SysWOW64\Socks.exeC:\Windows\system32\Socks.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552
-
C:\Windows\SysWOW64\Socks.exeC:\Windows\system32\Socks.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:364
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5ac8855856a867aefce59e4f40307e969
SHA179f93c61d9b66a701ab369d13e112d7d3ed5491a
SHA2564d149b06378fc38e99cc3c244941d79cbfb2c2917085945b6240aecabaf151a6
SHA512c5b1c3f018186214c68d5e57a27a2e9790a343fa62ce959577026202a441030c4819498aebcea365f817e736f1b54c245ab5a89532232e498887748ea59c4643