Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11/04/2023, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe
Resource
win10v2004-20230220-en
General
-
Target
cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe
-
Size
925KB
-
MD5
d249419f089dec604734f8f51513d57d
-
SHA1
cb4038ea5bcbc63d283c242541cd0e1073e6ef7f
-
SHA256
cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369
-
SHA512
f8b8af190eb1d3353fec06d58cc71bed716c936d16bf97a5861be21c615c4b9f3b69975f23df66ba2412967c7d9a7e111f135497a262232d22787e72e7bcb11e
-
SSDEEP
12288:4MrQy90x7xlbW6j/V8jgBGEegBK9hGGi2MlwcZkShEemRT8LcBW2RkZSQZQjS7LB:IySnjnogq2l3oeVQNRK5ZQcmMFr
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it478674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it478674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it478674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it478674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it478674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it478674.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 840 ziXQ9096.exe 756 zidY8545.exe 268 it478674.exe 936 jr158104.exe 1560 1.exe 268 kp451159.exe -
Loads dropped DLL 12 IoCs
pid Process 1984 cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe 840 ziXQ9096.exe 840 ziXQ9096.exe 756 zidY8545.exe 756 zidY8545.exe 756 zidY8545.exe 756 zidY8545.exe 936 jr158104.exe 936 jr158104.exe 1560 1.exe 840 ziXQ9096.exe 268 kp451159.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features it478674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it478674.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zidY8545.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziXQ9096.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziXQ9096.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce zidY8545.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 268 it478674.exe 268 it478674.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 268 it478674.exe Token: SeDebugPrivilege 936 jr158104.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1984 wrote to memory of 840 1984 cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe 27 PID 1984 wrote to memory of 840 1984 cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe 27 PID 1984 wrote to memory of 840 1984 cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe 27 PID 1984 wrote to memory of 840 1984 cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe 27 PID 1984 wrote to memory of 840 1984 cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe 27 PID 1984 wrote to memory of 840 1984 cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe 27 PID 1984 wrote to memory of 840 1984 cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe 27 PID 840 wrote to memory of 756 840 ziXQ9096.exe 28 PID 840 wrote to memory of 756 840 ziXQ9096.exe 28 PID 840 wrote to memory of 756 840 ziXQ9096.exe 28 PID 840 wrote to memory of 756 840 ziXQ9096.exe 28 PID 840 wrote to memory of 756 840 ziXQ9096.exe 28 PID 840 wrote to memory of 756 840 ziXQ9096.exe 28 PID 840 wrote to memory of 756 840 ziXQ9096.exe 28 PID 756 wrote to memory of 268 756 zidY8545.exe 29 PID 756 wrote to memory of 268 756 zidY8545.exe 29 PID 756 wrote to memory of 268 756 zidY8545.exe 29 PID 756 wrote to memory of 268 756 zidY8545.exe 29 PID 756 wrote to memory of 268 756 zidY8545.exe 29 PID 756 wrote to memory of 268 756 zidY8545.exe 29 PID 756 wrote to memory of 268 756 zidY8545.exe 29 PID 756 wrote to memory of 936 756 zidY8545.exe 30 PID 756 wrote to memory of 936 756 zidY8545.exe 30 PID 756 wrote to memory of 936 756 zidY8545.exe 30 PID 756 wrote to memory of 936 756 zidY8545.exe 30 PID 756 wrote to memory of 936 756 zidY8545.exe 30 PID 756 wrote to memory of 936 756 zidY8545.exe 30 PID 756 wrote to memory of 936 756 zidY8545.exe 30 PID 936 wrote to memory of 1560 936 jr158104.exe 31 PID 936 wrote to memory of 1560 936 jr158104.exe 31 PID 936 wrote to memory of 1560 936 jr158104.exe 31 PID 936 wrote to memory of 1560 936 jr158104.exe 31 PID 936 wrote to memory of 1560 936 jr158104.exe 31 PID 936 wrote to memory of 1560 936 jr158104.exe 31 PID 936 wrote to memory of 1560 936 jr158104.exe 31 PID 840 wrote to memory of 268 840 ziXQ9096.exe 32 PID 840 wrote to memory of 268 840 ziXQ9096.exe 32 PID 840 wrote to memory of 268 840 ziXQ9096.exe 32 PID 840 wrote to memory of 268 840 ziXQ9096.exe 32 PID 840 wrote to memory of 268 840 ziXQ9096.exe 32 PID 840 wrote to memory of 268 840 ziXQ9096.exe 32 PID 840 wrote to memory of 268 840 ziXQ9096.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe"C:\Users\Admin\AppData\Local\Temp\cc67731470ee3cbf470eeb063d9d0b93618c95ae2510bcd4852cf9bcc6ea2369.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXQ9096.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXQ9096.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidY8545.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidY8545.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it478674.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it478674.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr158104.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr158104.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp451159.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp451159.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:268
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
660KB
MD594e6ff3fef7b795a6be24353f26ea4b4
SHA1ad7e7bc4ea257a659d1c80d57d4aed22b2773aff
SHA256ca1b0fb534dd45101f85f41e3ad3b02fedab33e0d3c2f5bfd0e0a763d60d83f8
SHA512f110f6afecd41b77309e3e738f17067479770f123bc98f07dd08838d2cf32612d655b5e08f18fac09f508d942aa40250f3d51f9294a09df304a92dc4c8e32888
-
Filesize
660KB
MD594e6ff3fef7b795a6be24353f26ea4b4
SHA1ad7e7bc4ea257a659d1c80d57d4aed22b2773aff
SHA256ca1b0fb534dd45101f85f41e3ad3b02fedab33e0d3c2f5bfd0e0a763d60d83f8
SHA512f110f6afecd41b77309e3e738f17067479770f123bc98f07dd08838d2cf32612d655b5e08f18fac09f508d942aa40250f3d51f9294a09df304a92dc4c8e32888
-
Filesize
169KB
MD5c2ee6dfea1f389a4874f76d2fcee6491
SHA10f44d586fbb18892d3e97123e61201361ffdb8a2
SHA256c2155fa38cc377ad79a3c93dae78602db3461d165db96f9fcd1152692b09cbf2
SHA512be230ea7af89d618d2574d2044d05e244c778255f8cd329b1ce53219f06c653f57e29c8dc5c83482b1c7fcb49cb64456dec0515ff8c6a9805ea12bf26a7ec23a
-
Filesize
169KB
MD5c2ee6dfea1f389a4874f76d2fcee6491
SHA10f44d586fbb18892d3e97123e61201361ffdb8a2
SHA256c2155fa38cc377ad79a3c93dae78602db3461d165db96f9fcd1152692b09cbf2
SHA512be230ea7af89d618d2574d2044d05e244c778255f8cd329b1ce53219f06c653f57e29c8dc5c83482b1c7fcb49cb64456dec0515ff8c6a9805ea12bf26a7ec23a
-
Filesize
507KB
MD5ca68f1f35f253cd94fe85d031fcdd4e7
SHA13a7aec52e7d4e04f0fdaf2f036e07310609d39a9
SHA2562b2b4f4f31f748d40c16096112a8fb59ac8516f19cf13dcbb38d8d9b59a4cd92
SHA512f7ae96ce92b419f137bac33161d79fe66b3cfaad36cb93fd491481a54d193cf5912545b4d5d4a049a1669a88b9b7235577f2dd83a4b79af45f1d370b49160c0d
-
Filesize
507KB
MD5ca68f1f35f253cd94fe85d031fcdd4e7
SHA13a7aec52e7d4e04f0fdaf2f036e07310609d39a9
SHA2562b2b4f4f31f748d40c16096112a8fb59ac8516f19cf13dcbb38d8d9b59a4cd92
SHA512f7ae96ce92b419f137bac33161d79fe66b3cfaad36cb93fd491481a54d193cf5912545b4d5d4a049a1669a88b9b7235577f2dd83a4b79af45f1d370b49160c0d
-
Filesize
15KB
MD535c106657d4231803ddde519e86dc59b
SHA1d35abacdf3c5d11d8644dec1b3dd2fe030c6f789
SHA2566addd5d2b153ece6b55478ea97699c0a796ce23b459a13633b8e8d5f85891d6b
SHA512a3a50b113fcc71407c0c71c00fa90685f51405d06b5504849e1f3831808d9f63b9bf7e956806b19154dd148d749becab97c11c1ad2ffd79a180bd935893db281
-
Filesize
15KB
MD535c106657d4231803ddde519e86dc59b
SHA1d35abacdf3c5d11d8644dec1b3dd2fe030c6f789
SHA2566addd5d2b153ece6b55478ea97699c0a796ce23b459a13633b8e8d5f85891d6b
SHA512a3a50b113fcc71407c0c71c00fa90685f51405d06b5504849e1f3831808d9f63b9bf7e956806b19154dd148d749becab97c11c1ad2ffd79a180bd935893db281
-
Filesize
426KB
MD58df38b33375065200847d294c636c4ad
SHA1b40b816af34466e286f5efe95b56ddda0281a818
SHA256d8daf07088aa24e0e701ed02f3b51f5db34563ece5d6ec7ca66ec54d2060dbcd
SHA512ff65bdd5fd5ad1d8dc7cf541f65f9089d6d1023c69663eb43aa4997b4408313657f6b679b42de2840e1c2fd949d94e46cb13dd190a9bef52d0df74b77ce4b920
-
Filesize
426KB
MD58df38b33375065200847d294c636c4ad
SHA1b40b816af34466e286f5efe95b56ddda0281a818
SHA256d8daf07088aa24e0e701ed02f3b51f5db34563ece5d6ec7ca66ec54d2060dbcd
SHA512ff65bdd5fd5ad1d8dc7cf541f65f9089d6d1023c69663eb43aa4997b4408313657f6b679b42de2840e1c2fd949d94e46cb13dd190a9bef52d0df74b77ce4b920
-
Filesize
426KB
MD58df38b33375065200847d294c636c4ad
SHA1b40b816af34466e286f5efe95b56ddda0281a818
SHA256d8daf07088aa24e0e701ed02f3b51f5db34563ece5d6ec7ca66ec54d2060dbcd
SHA512ff65bdd5fd5ad1d8dc7cf541f65f9089d6d1023c69663eb43aa4997b4408313657f6b679b42de2840e1c2fd949d94e46cb13dd190a9bef52d0df74b77ce4b920
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0
-
Filesize
660KB
MD594e6ff3fef7b795a6be24353f26ea4b4
SHA1ad7e7bc4ea257a659d1c80d57d4aed22b2773aff
SHA256ca1b0fb534dd45101f85f41e3ad3b02fedab33e0d3c2f5bfd0e0a763d60d83f8
SHA512f110f6afecd41b77309e3e738f17067479770f123bc98f07dd08838d2cf32612d655b5e08f18fac09f508d942aa40250f3d51f9294a09df304a92dc4c8e32888
-
Filesize
660KB
MD594e6ff3fef7b795a6be24353f26ea4b4
SHA1ad7e7bc4ea257a659d1c80d57d4aed22b2773aff
SHA256ca1b0fb534dd45101f85f41e3ad3b02fedab33e0d3c2f5bfd0e0a763d60d83f8
SHA512f110f6afecd41b77309e3e738f17067479770f123bc98f07dd08838d2cf32612d655b5e08f18fac09f508d942aa40250f3d51f9294a09df304a92dc4c8e32888
-
Filesize
169KB
MD5c2ee6dfea1f389a4874f76d2fcee6491
SHA10f44d586fbb18892d3e97123e61201361ffdb8a2
SHA256c2155fa38cc377ad79a3c93dae78602db3461d165db96f9fcd1152692b09cbf2
SHA512be230ea7af89d618d2574d2044d05e244c778255f8cd329b1ce53219f06c653f57e29c8dc5c83482b1c7fcb49cb64456dec0515ff8c6a9805ea12bf26a7ec23a
-
Filesize
169KB
MD5c2ee6dfea1f389a4874f76d2fcee6491
SHA10f44d586fbb18892d3e97123e61201361ffdb8a2
SHA256c2155fa38cc377ad79a3c93dae78602db3461d165db96f9fcd1152692b09cbf2
SHA512be230ea7af89d618d2574d2044d05e244c778255f8cd329b1ce53219f06c653f57e29c8dc5c83482b1c7fcb49cb64456dec0515ff8c6a9805ea12bf26a7ec23a
-
Filesize
507KB
MD5ca68f1f35f253cd94fe85d031fcdd4e7
SHA13a7aec52e7d4e04f0fdaf2f036e07310609d39a9
SHA2562b2b4f4f31f748d40c16096112a8fb59ac8516f19cf13dcbb38d8d9b59a4cd92
SHA512f7ae96ce92b419f137bac33161d79fe66b3cfaad36cb93fd491481a54d193cf5912545b4d5d4a049a1669a88b9b7235577f2dd83a4b79af45f1d370b49160c0d
-
Filesize
507KB
MD5ca68f1f35f253cd94fe85d031fcdd4e7
SHA13a7aec52e7d4e04f0fdaf2f036e07310609d39a9
SHA2562b2b4f4f31f748d40c16096112a8fb59ac8516f19cf13dcbb38d8d9b59a4cd92
SHA512f7ae96ce92b419f137bac33161d79fe66b3cfaad36cb93fd491481a54d193cf5912545b4d5d4a049a1669a88b9b7235577f2dd83a4b79af45f1d370b49160c0d
-
Filesize
15KB
MD535c106657d4231803ddde519e86dc59b
SHA1d35abacdf3c5d11d8644dec1b3dd2fe030c6f789
SHA2566addd5d2b153ece6b55478ea97699c0a796ce23b459a13633b8e8d5f85891d6b
SHA512a3a50b113fcc71407c0c71c00fa90685f51405d06b5504849e1f3831808d9f63b9bf7e956806b19154dd148d749becab97c11c1ad2ffd79a180bd935893db281
-
Filesize
426KB
MD58df38b33375065200847d294c636c4ad
SHA1b40b816af34466e286f5efe95b56ddda0281a818
SHA256d8daf07088aa24e0e701ed02f3b51f5db34563ece5d6ec7ca66ec54d2060dbcd
SHA512ff65bdd5fd5ad1d8dc7cf541f65f9089d6d1023c69663eb43aa4997b4408313657f6b679b42de2840e1c2fd949d94e46cb13dd190a9bef52d0df74b77ce4b920
-
Filesize
426KB
MD58df38b33375065200847d294c636c4ad
SHA1b40b816af34466e286f5efe95b56ddda0281a818
SHA256d8daf07088aa24e0e701ed02f3b51f5db34563ece5d6ec7ca66ec54d2060dbcd
SHA512ff65bdd5fd5ad1d8dc7cf541f65f9089d6d1023c69663eb43aa4997b4408313657f6b679b42de2840e1c2fd949d94e46cb13dd190a9bef52d0df74b77ce4b920
-
Filesize
426KB
MD58df38b33375065200847d294c636c4ad
SHA1b40b816af34466e286f5efe95b56ddda0281a818
SHA256d8daf07088aa24e0e701ed02f3b51f5db34563ece5d6ec7ca66ec54d2060dbcd
SHA512ff65bdd5fd5ad1d8dc7cf541f65f9089d6d1023c69663eb43aa4997b4408313657f6b679b42de2840e1c2fd949d94e46cb13dd190a9bef52d0df74b77ce4b920
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0