Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe
Resource
win7-20220812-en
General
-
Target
63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe
-
Size
116KB
-
MD5
0b885ed723a267e39d90dacd99d29e71
-
SHA1
0eea34d096dfd5b70cb8fea2bdd2fe411dfa39ab
-
SHA256
63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43
-
SHA512
e4d120648b71010d7eb51c858e1c1e9b985a352bf4f16daa4ec59831e6131f9b5bcddfd318615e60fb25485dacd71514b03663503ed0cb7c2d9b02ae561179aa
-
SSDEEP
1536:6bqBQiRBxl5EzcBK/evhxx7C/iijdP5qHw76xDjqTQEnYa7bRgfoSXkgvV84vadC:zbRBxl5NBHt8RP4q6x0Zn3Cbkgy4C
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 1664 Logo1_.exe 1524 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe -
Deletes itself 1 IoCs
pid Process 952 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 952 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\F: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1036\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\CrashReports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\WSS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmprph.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Filters\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\HostSideAdapters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1031\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe File created C:\Windows\Logo1_.exe 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1956 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 26 PID 2024 wrote to memory of 1956 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 26 PID 2024 wrote to memory of 1956 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 26 PID 2024 wrote to memory of 1956 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 26 PID 1956 wrote to memory of 280 1956 net.exe 28 PID 1956 wrote to memory of 280 1956 net.exe 28 PID 1956 wrote to memory of 280 1956 net.exe 28 PID 1956 wrote to memory of 280 1956 net.exe 28 PID 2024 wrote to memory of 952 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 29 PID 2024 wrote to memory of 952 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 29 PID 2024 wrote to memory of 952 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 29 PID 2024 wrote to memory of 952 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 29 PID 2024 wrote to memory of 1664 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 30 PID 2024 wrote to memory of 1664 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 30 PID 2024 wrote to memory of 1664 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 30 PID 2024 wrote to memory of 1664 2024 63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe 30 PID 1664 wrote to memory of 1608 1664 Logo1_.exe 32 PID 1664 wrote to memory of 1608 1664 Logo1_.exe 32 PID 1664 wrote to memory of 1608 1664 Logo1_.exe 32 PID 1664 wrote to memory of 1608 1664 Logo1_.exe 32 PID 1608 wrote to memory of 1456 1608 net.exe 34 PID 1608 wrote to memory of 1456 1608 net.exe 34 PID 1608 wrote to memory of 1456 1608 net.exe 34 PID 1608 wrote to memory of 1456 1608 net.exe 34 PID 952 wrote to memory of 1524 952 cmd.exe 35 PID 952 wrote to memory of 1524 952 cmd.exe 35 PID 952 wrote to memory of 1524 952 cmd.exe 35 PID 952 wrote to memory of 1524 952 cmd.exe 35 PID 1664 wrote to memory of 1440 1664 Logo1_.exe 36 PID 1664 wrote to memory of 1440 1664 Logo1_.exe 36 PID 1664 wrote to memory of 1440 1664 Logo1_.exe 36 PID 1664 wrote to memory of 1440 1664 Logo1_.exe 36 PID 1440 wrote to memory of 664 1440 net.exe 38 PID 1440 wrote to memory of 664 1440 net.exe 38 PID 1440 wrote to memory of 664 1440 net.exe 38 PID 1440 wrote to memory of 664 1440 net.exe 38 PID 1664 wrote to memory of 1340 1664 Logo1_.exe 13 PID 1664 wrote to memory of 1340 1664 Logo1_.exe 13
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe"C:\Users\Admin\AppData\Local\Temp\63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:280
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a5C83.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe"C:\Users\Admin\AppData\Local\Temp\63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe"4⤵
- Executes dropped EXE
PID:1524
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1456
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:664
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
722B
MD548adb030905636055e2ca1259de54697
SHA1c193b2d45d4d7dc97d376bd31193c5a5091abb83
SHA256591682f93416711cb3440fae957f078a05246b4d03774529783037f7172244a3
SHA512600499f219dc8cce4d13cfd9ee37965ec1e71c88e5ca1964bc9cb2331954ee3a9ccebd3700d363df52a8b5beb0046c96de5b883064d73ba146871a99754ea328
-
C:\Users\Admin\AppData\Local\Temp\63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe
Filesize14KB
MD5f0dfb2a69d35078d5df8739cb62fadf1
SHA12928b68d948940525c9a171a08c83f569d3ac744
SHA256947df2894a77d3c4ea639222e2dfcc910430b6dc9618a48035c6e7cce62f4f85
SHA512220ed6bcbb19897277f8b26a3ff541296d200932af102a0012dff973ca99cf52a1a2110b79d8a3597b740de42de4826cbdd4d03393a4aa2750db455ee0af73e8
-
C:\Users\Admin\AppData\Local\Temp\63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe.exe
Filesize14KB
MD5f0dfb2a69d35078d5df8739cb62fadf1
SHA12928b68d948940525c9a171a08c83f569d3ac744
SHA256947df2894a77d3c4ea639222e2dfcc910430b6dc9618a48035c6e7cce62f4f85
SHA512220ed6bcbb19897277f8b26a3ff541296d200932af102a0012dff973ca99cf52a1a2110b79d8a3597b740de42de4826cbdd4d03393a4aa2750db455ee0af73e8
-
Filesize
102KB
MD5d877bc30563b5b563dc157612abd7604
SHA1529b855df49a169099c93401dd282fb2b5242a29
SHA25699b6fec9b18091bb3dc617be2df3d75c5f5b51945503f23486f3f49579632cb6
SHA5129398fd0078dce71cedaf067fcd59afcc8599d52cd6fddb66496d26025ab60d59b82aeeb471fe21a97b71c25a587fe4f202ff26fe46da347fea60d3d0105281a3
-
Filesize
102KB
MD5d877bc30563b5b563dc157612abd7604
SHA1529b855df49a169099c93401dd282fb2b5242a29
SHA25699b6fec9b18091bb3dc617be2df3d75c5f5b51945503f23486f3f49579632cb6
SHA5129398fd0078dce71cedaf067fcd59afcc8599d52cd6fddb66496d26025ab60d59b82aeeb471fe21a97b71c25a587fe4f202ff26fe46da347fea60d3d0105281a3
-
Filesize
102KB
MD5d877bc30563b5b563dc157612abd7604
SHA1529b855df49a169099c93401dd282fb2b5242a29
SHA25699b6fec9b18091bb3dc617be2df3d75c5f5b51945503f23486f3f49579632cb6
SHA5129398fd0078dce71cedaf067fcd59afcc8599d52cd6fddb66496d26025ab60d59b82aeeb471fe21a97b71c25a587fe4f202ff26fe46da347fea60d3d0105281a3
-
\Users\Admin\AppData\Local\Temp\63ac684ec0f4661ca18b2f5b07aeea5b1db40ced75b97d70b01357c378239b43.exe
Filesize14KB
MD5f0dfb2a69d35078d5df8739cb62fadf1
SHA12928b68d948940525c9a171a08c83f569d3ac744
SHA256947df2894a77d3c4ea639222e2dfcc910430b6dc9618a48035c6e7cce62f4f85
SHA512220ed6bcbb19897277f8b26a3ff541296d200932af102a0012dff973ca99cf52a1a2110b79d8a3597b740de42de4826cbdd4d03393a4aa2750db455ee0af73e8