Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2023, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe
Resource
win10v2004-20230703-en
General
-
Target
c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe
-
Size
814KB
-
MD5
e704be8121d4d4b6f193b97f1ac1e8b0
-
SHA1
846d1f346d6d8aa87f0e5b499662fe16b1f9580c
-
SHA256
c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6
-
SHA512
1a6119c1ad6b0ab837b6db0db5ea6e73e25f6382bdd3c01a30776bf9692b6dfe89974475ebb15a3b8659c47ec2686cd43604122030a61d547b2d79d5c57bf700
-
SSDEEP
24576:U7i7ypA8y0MBhdxGqT/xcLaT5FTHAPYtnPP:U7iv8y/BTrAPYB3
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1880 Logo1_.exe 1136 c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\CortanaApp.ViewElements\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-100_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\nb-no\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Maps.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_2019.19071.19011.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\uk-ua\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Multimedia Platform\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\en-gb\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\MicrosoftEdgeUpdateOnDemand.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ru-RU\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-gb\locimages\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ja-JP\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe File created C:\Windows\Logo1_.exe c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe 1880 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3588 wrote to memory of 4352 3588 c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe 82 PID 3588 wrote to memory of 4352 3588 c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe 82 PID 3588 wrote to memory of 4352 3588 c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe 82 PID 3588 wrote to memory of 1880 3588 c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe 83 PID 3588 wrote to memory of 1880 3588 c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe 83 PID 3588 wrote to memory of 1880 3588 c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe 83 PID 1880 wrote to memory of 3056 1880 Logo1_.exe 84 PID 1880 wrote to memory of 3056 1880 Logo1_.exe 84 PID 1880 wrote to memory of 3056 1880 Logo1_.exe 84 PID 3056 wrote to memory of 4824 3056 net.exe 87 PID 3056 wrote to memory of 4824 3056 net.exe 87 PID 3056 wrote to memory of 4824 3056 net.exe 87 PID 4352 wrote to memory of 1136 4352 cmd.exe 88 PID 4352 wrote to memory of 1136 4352 cmd.exe 88 PID 4352 wrote to memory of 1136 4352 cmd.exe 88 PID 1880 wrote to memory of 760 1880 Logo1_.exe 53 PID 1880 wrote to memory of 760 1880 Logo1_.exe 53
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe"C:\Users\Admin\AppData\Local\Temp\c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a690A.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe"C:\Users\Admin\AppData\Local\Temp\c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe"4⤵
- Executes dropped EXE
PID:1136
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:4824
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5533ce215a7c274602dc456ca375cef93
SHA176c502d7c45eca3fd96f6b04eb850e751bc785dd
SHA256d70c9f73bbeed5cbc0df4a4d14bae68789f84d8092281337d2919322b288ce9c
SHA51209d9dee36c48567921de4b7c31c4a822d5f9ed5e0b1cb0330031b320f40b5ba9b15e89dc37d52561094642c0ff16c14d32e81ed5b1dac06150fefbbd6f3365bf
-
Filesize
484KB
MD5852f9d07b9476f082ded088734678fbd
SHA1db7f73161ead7b7d0dc6ae385ba316b4e8039091
SHA256f9a05645fb3ee901dae3307a79d66071cb75b6474c6af90ba08504648c7a427d
SHA5120658219a60160828feec211851adbc25fec814f6395b0251fd5c1bccabe5c7b416ff447f4ad75724736ec4df0ac51067b98f1f7b6e6f977a6c73a700696d334c
-
Filesize
722B
MD57e9048234734cff808a432183c24bfd9
SHA1ba9ce6648dd5de29c590cfc31972d88de4de4073
SHA2560fb8dee6eca2e27594ebf421e927c59ecf6091fa6508c6c36c4062ab38ef671c
SHA51272abe1e2249b560b2b7fc2b2a04eb2b2b2a772035dcf817ed3d209204c00f130924e9a5624326c2d39eb6593ee643594c43950c97696429215bcaf12b68dfded
-
C:\Users\Admin\AppData\Local\Temp\c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe
Filesize787KB
MD54e91dc4cf618e0c55ca99d0847d4bd6f
SHA1e2f350efab6f81ac8a6c49a2aa1bc31469e6f7c2
SHA256723f5567caa0da7a7e92b0cb3c89284f3a1c4f5103eeeacdb4bdaf3bc070a85e
SHA512a3dcd98a1247920d0f27576e4cecdb545655ded0fe1af47ca38789bd81fc6ee46333230fa0086b338698da72038ca09f279a6074be6f1a76dba2269915096f2d
-
C:\Users\Admin\AppData\Local\Temp\c2209b95c1120ac3f843c7fcf172dc0bb0c43047a33c3d01b64f695fa558d7a6.exe.exe
Filesize787KB
MD54e91dc4cf618e0c55ca99d0847d4bd6f
SHA1e2f350efab6f81ac8a6c49a2aa1bc31469e6f7c2
SHA256723f5567caa0da7a7e92b0cb3c89284f3a1c4f5103eeeacdb4bdaf3bc070a85e
SHA512a3dcd98a1247920d0f27576e4cecdb545655ded0fe1af47ca38789bd81fc6ee46333230fa0086b338698da72038ca09f279a6074be6f1a76dba2269915096f2d
-
Filesize
26KB
MD5925efa8e6ec043b04fdaf9e6c9f95b9f
SHA14bb883e016bdeecc3f21b562df6364944b777ae3
SHA2566513ef9968b68f982fb83460b5919e55470f514db71c3831c2ea5c7b3a2721db
SHA512bf4978b5b10932de14d0c64566768708331f89a815f153323173506aecc296236a22d387b5caceba100c72b44e6b870e879f7350f1abce413bb92d54e70b133e
-
Filesize
26KB
MD5925efa8e6ec043b04fdaf9e6c9f95b9f
SHA14bb883e016bdeecc3f21b562df6364944b777ae3
SHA2566513ef9968b68f982fb83460b5919e55470f514db71c3831c2ea5c7b3a2721db
SHA512bf4978b5b10932de14d0c64566768708331f89a815f153323173506aecc296236a22d387b5caceba100c72b44e6b870e879f7350f1abce413bb92d54e70b133e
-
Filesize
26KB
MD5925efa8e6ec043b04fdaf9e6c9f95b9f
SHA14bb883e016bdeecc3f21b562df6364944b777ae3
SHA2566513ef9968b68f982fb83460b5919e55470f514db71c3831c2ea5c7b3a2721db
SHA512bf4978b5b10932de14d0c64566768708331f89a815f153323173506aecc296236a22d387b5caceba100c72b44e6b870e879f7350f1abce413bb92d54e70b133e
-
Filesize
9B
MD59fb0d747aab9819a1c8fa05b0d77a547
SHA1e2c0c3a76a6c8c6c5c5455fca3dc7441bf904c55
SHA256da6002d50ace5aa5b493d8ccce59e708decbbd8097b1614910388e1e59f95b96
SHA512cdb7b033dc42633b5addc0a358a744586059a0fe54f3b030bedcc7d1eb0e75b5c68e768c3c964c6046afb6767589db33c39bc83d4c8c6fa4f3b74ad4922c834c