Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
35s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe
Resource
win10v2004-20221111-en
General
-
Target
661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe
-
Size
543KB
-
MD5
825100d6daff20bdd270b180f808d806
-
SHA1
c79792ebd55b9b917b80eb96c5775c3b82e802b7
-
SHA256
661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
-
SHA512
4e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
SSDEEP
6144:oa7m8DALU2df1HgpW+AvnfHFfCzGaEsu3c3ylXbWSullT/qYsgbWa6nU52QSFpnz:PUk5L52QSFpIc3bIKTsusSDz8hFPhs7
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Spooler 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Spooler = "C:\\ProgramData\\Microsoft\\spoolsv.exe" 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Task Scheduler 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Task Scheduler = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\mstinit.exe" 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe -
Executes dropped EXE 1 IoCs
pid Process 1476 winlogon.exe -
Loads dropped DLL 22 IoCs
pid Process 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe 1572 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\MessageService 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\MessageService = "C:\\ProgramData\\Microsoft\\mqtgsvc.exe" 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Sessmgr 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Sessmgr = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\sessmgr.exe" 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\MICROS~1\clipsrv.exe 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1572 1476 WerFault.exe 28 -
Modifies data under HKEY_USERS 14 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ClipSrv 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinLogon 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinLogon = "C:\\Users\\Admin\\Local Settings\\Application Data\\Microsoft\\Windows\\winlogon.exe" 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Key created \REGISTRY\USER\.DEFAULT 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Key created \REGISTRY\USER\.DEFAULT\Software 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ClipSrv = "C:\\Users\\Admin\\Local Settings\\Application Data\\Microsoft\\Windows\\clipsrv.exe" 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1476 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 28 PID 1620 wrote to memory of 1476 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 28 PID 1620 wrote to memory of 1476 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 28 PID 1620 wrote to memory of 1476 1620 661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe 28 PID 1476 wrote to memory of 1572 1476 winlogon.exe 30 PID 1476 wrote to memory of 1572 1476 winlogon.exe 30 PID 1476 wrote to memory of 1572 1476 winlogon.exe 30 PID 1476 wrote to memory of 1572 1476 winlogon.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe"C:\Users\Admin\AppData\Local\Temp\661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817.exe"1⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\winlogon.exe"C:\Users\Admin\Local Settings\Application Data\Microsoft\Windows\winlogon.exe" /a 12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 5523⤵
- Loads dropped DLL
- Program crash
PID:1572
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
10B
MD5fb94569c4257a2e21bdf66a4346d75fd
SHA173dced5ad758ed7e888d67afca09ecd0635e1632
SHA256c3261d669f63184dc871bb804527813ccd64f20c4241cadf9defa94dc1cf0cd6
SHA512d4c06e6371e84b339baddb5b7c8f0f1a4a857bb4cae214db5b7b90c3ea87e9eae52849e75f5ce530669db1ae485496405a6a82f308994ae97377a71263812f29
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c
-
Filesize
543KB
MD5825100d6daff20bdd270b180f808d806
SHA1c79792ebd55b9b917b80eb96c5775c3b82e802b7
SHA256661b7a8563f9623a5cb7d25c0d2da3428beb62e4582ac05e1839997a6ee30817
SHA5124e1097be9dfcd225739d9e5c25b98bb7e3eccc1ea7b31b849c474fb67290e6262c78b188971f3e6217036e76c83e476d33d930ffebe2c2f3d92adf62372f497c