Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe
Resource
win10v2004-20241007-en
General
-
Target
3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe
-
Size
1.2MB
-
MD5
0de4333f75d28ab023f56e208ea1f4f2
-
SHA1
7edd7e6ce18728cbe132c256bbdc51a7b24002d5
-
SHA256
3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d
-
SHA512
d8c0cf967227837f9d49dd271e99c408d63909cc954074dc21f1fb788bb5bf1bccd9e5a1b7c997b2373b35ff0897fe43bcd3221e38a708642a14493a6271e54e
-
SSDEEP
24576:oGl/8l+k1W0tq78x3s+hPNt790/ASMcmqhrbjXxI+PpKWSJTzCduD:Ll/8l+kAf78x3B2ASMHKrfPpATz3D
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Processes:
resource C:\Users\Admin\AppData\Local\Temp\cfIQ9Gqy.xlsm -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2044 cmd.exe -
Executes dropped EXE 7 IoCs
Processes:
tmp142.exetmp142.exe._cache_tmp142.exeSynaptics.exeServer.exeSynaptics.exe._cache_Synaptics.exepid process 2172 tmp142.exe 2504 tmp142.exe 2528 ._cache_tmp142.exe 2692 Synaptics.exe 2716 Server.exe 576 Synaptics.exe 700 ._cache_Synaptics.exe -
Loads dropped DLL 9 IoCs
Processes:
3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exetmp142.exetmp142.exeSynaptics.exepid process 2376 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 2376 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 2172 tmp142.exe 2504 tmp142.exe 2504 tmp142.exe 2504 tmp142.exe 2504 tmp142.exe 576 Synaptics.exe 576 Synaptics.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
tmp142.exe._cache_tmp142.exeServer.exe._cache_Synaptics.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\????? = "C:\\ProgramData\\Synaptics\\Synaptics.exe" tmp142.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Local\\Temp\\._cache_tmp142.exe" ._cache_tmp142.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Roaming\\VanToM Folder\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Server = "C:\\Users\\Admin\\AppData\\Local\\Temp\\._cache_Synaptics.exe" ._cache_Synaptics.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
tmp142.exeSynaptics.exedescription pid process target process PID 2172 set thread context of 2504 2172 tmp142.exe tmp142.exe PID 2692 set thread context of 576 2692 Synaptics.exe Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Synaptics.exeEXCEL.EXE3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exetmp142.execmd.exetmp142.exeSynaptics.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp142.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Modifies registry class 7 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3008 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exetmp142.exeSynaptics.exepid process 2376 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe 2172 tmp142.exe 2692 Synaptics.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
._cache_tmp142.exeServer.exe._cache_Synaptics.exepid process 2528 ._cache_tmp142.exe 2716 Server.exe 700 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
._cache_tmp142.exeServer.exe._cache_Synaptics.exeEXCEL.EXEpid process 2528 ._cache_tmp142.exe 2716 Server.exe 700 ._cache_Synaptics.exe 3008 EXCEL.EXE -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exetmp142.exetmp142.exe._cache_tmp142.exeServer.exeSynaptics.exeSynaptics.exedescription pid process target process PID 2376 wrote to memory of 2172 2376 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe tmp142.exe PID 2376 wrote to memory of 2172 2376 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe tmp142.exe PID 2376 wrote to memory of 2172 2376 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe tmp142.exe PID 2376 wrote to memory of 2172 2376 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe tmp142.exe PID 2376 wrote to memory of 2044 2376 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe cmd.exe PID 2376 wrote to memory of 2044 2376 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe cmd.exe PID 2376 wrote to memory of 2044 2376 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe cmd.exe PID 2376 wrote to memory of 2044 2376 3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe cmd.exe PID 2172 wrote to memory of 2504 2172 tmp142.exe tmp142.exe PID 2172 wrote to memory of 2504 2172 tmp142.exe tmp142.exe PID 2172 wrote to memory of 2504 2172 tmp142.exe tmp142.exe PID 2172 wrote to memory of 2504 2172 tmp142.exe tmp142.exe PID 2172 wrote to memory of 2504 2172 tmp142.exe tmp142.exe PID 2172 wrote to memory of 2504 2172 tmp142.exe tmp142.exe PID 2172 wrote to memory of 2504 2172 tmp142.exe tmp142.exe PID 2172 wrote to memory of 2504 2172 tmp142.exe tmp142.exe PID 2172 wrote to memory of 2504 2172 tmp142.exe tmp142.exe PID 2172 wrote to memory of 2504 2172 tmp142.exe tmp142.exe PID 2172 wrote to memory of 2504 2172 tmp142.exe tmp142.exe PID 2172 wrote to memory of 2504 2172 tmp142.exe tmp142.exe PID 2504 wrote to memory of 2528 2504 tmp142.exe ._cache_tmp142.exe PID 2504 wrote to memory of 2528 2504 tmp142.exe ._cache_tmp142.exe PID 2504 wrote to memory of 2528 2504 tmp142.exe ._cache_tmp142.exe PID 2504 wrote to memory of 2528 2504 tmp142.exe ._cache_tmp142.exe PID 2504 wrote to memory of 2692 2504 tmp142.exe Synaptics.exe PID 2504 wrote to memory of 2692 2504 tmp142.exe Synaptics.exe PID 2504 wrote to memory of 2692 2504 tmp142.exe Synaptics.exe PID 2504 wrote to memory of 2692 2504 tmp142.exe Synaptics.exe PID 2528 wrote to memory of 2716 2528 ._cache_tmp142.exe Server.exe PID 2528 wrote to memory of 2716 2528 ._cache_tmp142.exe Server.exe PID 2528 wrote to memory of 2716 2528 ._cache_tmp142.exe Server.exe PID 2716 wrote to memory of 2904 2716 Server.exe rundll32.exe PID 2716 wrote to memory of 2904 2716 Server.exe rundll32.exe PID 2716 wrote to memory of 2904 2716 Server.exe rundll32.exe PID 2692 wrote to memory of 576 2692 Synaptics.exe Synaptics.exe PID 2692 wrote to memory of 576 2692 Synaptics.exe Synaptics.exe PID 2692 wrote to memory of 576 2692 Synaptics.exe Synaptics.exe PID 2692 wrote to memory of 576 2692 Synaptics.exe Synaptics.exe PID 2692 wrote to memory of 576 2692 Synaptics.exe Synaptics.exe PID 2692 wrote to memory of 576 2692 Synaptics.exe Synaptics.exe PID 2692 wrote to memory of 576 2692 Synaptics.exe Synaptics.exe PID 2692 wrote to memory of 576 2692 Synaptics.exe Synaptics.exe PID 2692 wrote to memory of 576 2692 Synaptics.exe Synaptics.exe PID 2692 wrote to memory of 576 2692 Synaptics.exe Synaptics.exe PID 2692 wrote to memory of 576 2692 Synaptics.exe Synaptics.exe PID 2692 wrote to memory of 576 2692 Synaptics.exe Synaptics.exe PID 576 wrote to memory of 700 576 Synaptics.exe ._cache_Synaptics.exe PID 576 wrote to memory of 700 576 Synaptics.exe ._cache_Synaptics.exe PID 576 wrote to memory of 700 576 Synaptics.exe ._cache_Synaptics.exe PID 576 wrote to memory of 700 576 Synaptics.exe ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe"C:\Users\Admin\AppData\Local\Temp\3b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\tmp142.exe"C:\Users\Admin\AppData\Local\Temp\tmp142.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\tmp142.exeC:\Users\Admin\AppData\Local\Temp\tmp142.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\._cache_tmp142.exe"C:\Users\Admin\AppData\Local\Temp\._cache_tmp142.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe"C:\Users\Admin\AppData\Roaming\VanToM Folder\Server.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\Server6⤵
- Modifies registry class
PID:2904
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:700
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3B4B87~1.EXE >> NUL2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2044
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3008
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
24KB
MD506b36aa9907cee58d95f597c985f1c17
SHA19ac95d8fae1cffdd6b1f0aa321b151bbc6817e95
SHA25658916fcc54659e4b1b8745b762f656b3c2193d0237ae390f9f3f3120e6b2dfbe
SHA512ff550ffeb75d73fbc2d0a72792ed199ef7164b93e800fab541fde52c5c2b81d98e4688016bf341529e22f04090d3369a26d105dd1f27f7eb5c8ee2297eb94f84
-
Filesize
29KB
MD5f6bb56bfecba2dbc4cfd46c592b1607a
SHA126fe9a7747493b6ad43ba6369c0b09dc18e0e898
SHA2562b4ab1cf719ecee7b206b82f7e558318d82957646c0d45ed05ebcc1ba2532e35
SHA512807a6282846023f6d34ca6f6fc906c5166babd3b149ed19a03c89add0638b77ccbd6a2695dee69fe669a8080f25ca8244bab108526ea1fc2f231cf0daeade594
-
Filesize
31KB
MD536ec1df4b0ca9ce375cfde47f4c53754
SHA10e77a338fccc4a4630ad44cbe45c5c759c767220
SHA256c2608deae37541cafc17d2bd85911a9a6073b22a1b1ddab493346fd38fc66d78
SHA512ae104e1c896223694764554535f24a83b07d06a5690b59889565666d4ea23e7fb879145951e97e89b2ee80b97746b2619541ae0ab7ebbe0fefe605a527d4c42c
-
Filesize
28KB
MD53c2be0d35b8f4f91a6e85f5b28a8c929
SHA1802049ae34c19e175efdc26adfcc56e4ae1ff201
SHA2568dac1c1ce06895b8770b1c01a314296e733c2d45c6fd1d971964ba536a9349c0
SHA512c2c9942bced3254f3138cf383e5ec839f28cbd6ae761192550053c5c81ef3da7a23ab753f72adadd628503cc40c4d03ba11cf25cb8170e072e23e819118b6c34
-
Filesize
26KB
MD5221670be459bfc6bdf650109047e23dd
SHA12dc49a6ca7461f4004b58e292f303644c4c4d780
SHA2560b0528dae7db3ee7370090779e6e2cef300362d1c174979e2b7ad294a5e263f4
SHA5123f7e3337cfb307913b10d4fc04839d8466e10dbf4bce208757decec28ef182abf65a3f1ad89568b648deb4c78458c33b61e0a3724660beffc5fd9d7207ab241d
-
Filesize
52B
MD529d493876bc0b2c8a6f38aa4a4379166
SHA1dbb33f3fc329e87dbf2dd292c61207570706fa41
SHA256984c05a8529073f415e789b0af9355d0c1f2e232993eed1b967403e42b34233e
SHA51245f6921600962d05a6cb03280194324a277d5a81fb1b7ff64679be38ad1b190fca2b531e08a834500861ac08283f063512c3e9d03274748d060d77bb083a006b
-
Filesize
55B
MD56b1120fc600709ac2a9bca24748ef527
SHA130edf806f6ca0fc848646e16736ffd4023e33d29
SHA25605efbecfb9f31be92e98e62caac469f974f49cbaeea800d5a6a42eba4f706ba6
SHA512861c6929c438e7985abb8ad3a9ce8dad1f1abc84ebf682ed4676ba5020e500ce63f94f88263c016308a4cbae95e7133c2617b253a05ed3e88967a512233d3982
-
Filesize
165B
MD5ff09371174f7c701e75f357a187c06e8
SHA157f9a638fd652922d7eb23236c80055a91724503
SHA256e4ba04959837c27019a2349015543802439e152ddc4baf4e8c7b9d2b483362a8
SHA512e4d01e5908e9f80b7732473ec6807bb7faa5425e3154d5642350f44d7220af3cffd277e0b67bcf03f1433ac26a26edb3ddd3707715b61d054b979fbb4b453882
-
Filesize
318KB
MD5166cf19911e45785a3407433a2b447c4
SHA1a08d582e55c5b66ef78bd5dd3e386730d8be4227
SHA256a7b85bf490f372521788658ec25d3de4a14babd79abb5ddb646e30d87dd9ae27
SHA5127934c5bf3657a4396fca70daebe01cd11e61c8e3f9b5cfd9c068d688f8b91ab5058c5dc68b0ba80b32b276348afb8ea6e70bba5f314722a7f04011607a3e7b14
-
Filesize
1.2MB
MD50de4333f75d28ab023f56e208ea1f4f2
SHA17edd7e6ce18728cbe132c256bbdc51a7b24002d5
SHA2563b4b87fdc8c5531b416d5d9817c8ea165c8a79ad4d23154a50cd55a4965a585d
SHA512d8c0cf967227837f9d49dd271e99c408d63909cc954074dc21f1fb788bb5bf1bccd9e5a1b7c997b2373b35ff0897fe43bcd3221e38a708642a14493a6271e54e