Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe
Resource
win7-20240220-en
General
-
Target
cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe
-
Size
577KB
-
MD5
cd0da8079d030260e29eb9bc8dbe4f34
-
SHA1
0e5f49eb2a9a598947488406233dfaa7decb4729
-
SHA256
cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b
-
SHA512
f1c872e107ff95b920a4c6f4b3ae005e4ee4d8acb89f95ae371a8d7d829c857845dc7eb29cd3dad10770e1b292f2852b43e728972bcfc29004ccd762a9c66f38
-
SSDEEP
6144:Sf46tGdye419E7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQC:+3NbI7a3iwbihym2g7XO3LWUQfh4Co
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Deletes itself 1 IoCs
pid Process 2544 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2604 Logo1_.exe 2500 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe -
Loads dropped DLL 1 IoCs
pid Process 2544 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\include\win32\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d11\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\DW\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe File created C:\Windows\Logo1_.exe cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe 2604 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2316 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 28 PID 2872 wrote to memory of 2316 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 28 PID 2872 wrote to memory of 2316 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 28 PID 2872 wrote to memory of 2316 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 28 PID 2316 wrote to memory of 2904 2316 net.exe 30 PID 2316 wrote to memory of 2904 2316 net.exe 30 PID 2316 wrote to memory of 2904 2316 net.exe 30 PID 2316 wrote to memory of 2904 2316 net.exe 30 PID 2872 wrote to memory of 2544 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 31 PID 2872 wrote to memory of 2544 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 31 PID 2872 wrote to memory of 2544 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 31 PID 2872 wrote to memory of 2544 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 31 PID 2872 wrote to memory of 2604 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 33 PID 2872 wrote to memory of 2604 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 33 PID 2872 wrote to memory of 2604 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 33 PID 2872 wrote to memory of 2604 2872 cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe 33 PID 2604 wrote to memory of 2548 2604 Logo1_.exe 34 PID 2604 wrote to memory of 2548 2604 Logo1_.exe 34 PID 2604 wrote to memory of 2548 2604 Logo1_.exe 34 PID 2604 wrote to memory of 2548 2604 Logo1_.exe 34 PID 2548 wrote to memory of 2688 2548 net.exe 36 PID 2548 wrote to memory of 2688 2548 net.exe 36 PID 2548 wrote to memory of 2688 2548 net.exe 36 PID 2548 wrote to memory of 2688 2548 net.exe 36 PID 2544 wrote to memory of 2500 2544 cmd.exe 37 PID 2544 wrote to memory of 2500 2544 cmd.exe 37 PID 2544 wrote to memory of 2500 2544 cmd.exe 37 PID 2544 wrote to memory of 2500 2544 cmd.exe 37 PID 2604 wrote to memory of 2536 2604 Logo1_.exe 38 PID 2604 wrote to memory of 2536 2604 Logo1_.exe 38 PID 2604 wrote to memory of 2536 2604 Logo1_.exe 38 PID 2604 wrote to memory of 2536 2604 Logo1_.exe 38 PID 2536 wrote to memory of 2512 2536 net.exe 40 PID 2536 wrote to memory of 2512 2536 net.exe 40 PID 2536 wrote to memory of 2512 2536 net.exe 40 PID 2536 wrote to memory of 2512 2536 net.exe 40 PID 2604 wrote to memory of 1084 2604 Logo1_.exe 18 PID 2604 wrote to memory of 1084 2604 Logo1_.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe"C:\Users\Admin\AppData\Local\Temp\cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2904
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a195A.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe"C:\Users\Admin\AppData\Local\Temp\cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe"4⤵
- Executes dropped EXE
PID:2500
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2688
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2512
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD582db094480878229391119e2daa623da
SHA1e51a3eeef5a340d4854f95d321a0f7bbf2bb151b
SHA2568e5056345931b7919fa3b3b7d46b10e8ec8e4188ffa6da28a62325061ea139a6
SHA512cc4d27f0d7618e07cf4496b7f6ec554a557a8c9944986a383ce003c78963013101a1f7449632cdf8669dd17269a743ab49250a46eed8f78dfc7db363d8eecee3
-
Filesize
478KB
MD50a2f7bc5d2f3b1abbf852f12ac72d39f
SHA13ed5d15e03f4a79247638844b8e938794445bfde
SHA256c2eadf7bc1b2c55782d5307c4bfdc59f4c900494b9a624e199c675b582a13d7c
SHA5128c47195b5c79359b6e7c5088d1a2c757ce6a1f16dd61c4c4d0bb7baafba4135c7a64541ce7a3af55b65f83af3df2677ff6f63f9c80fdfb1f7696d54c4609d63d
-
Filesize
722B
MD5f5758a63ec5cc64cef31c646b1612c38
SHA1055237b9f5a2213c6190ad550e12a5e1bd7501d2
SHA2564df1c474a956ca8b2ebe8e0ed46ec91d5f4605309a5f699bb13a17167027513f
SHA51264b2ba09c47a60e57e23eacc55e96edc743214d69b78741a42ef4a619e5f15351b359156b2302cd51702b54c361d22638f746a56b3595ca14136cff00b24b699
-
C:\Users\Admin\AppData\Local\Temp\cf5203aaf7334124db34e06d07bc8774ccb27e3dc727b664f4b831c821812a2b.exe.exe
Filesize544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
33KB
MD5beb8ef622f9b59e1fbe24c77c2a4d0c2
SHA11d1560dd34ca71ecf721711b91b81cc3ceff0469
SHA256a13c71d4050c4b76a86757d3d3dec5a0f3d5ebf1de2979a5d5b74fcd60f23ed1
SHA512e06c0219fbe6df369a21aae4b16b6f14a261b5416bf6543b096382f8fa80a3a60b5f2793b3c818238a345a960ae315c288e3d378e83fef05817ba2ef58843532
-
Filesize
832B
MD57e3a0edd0c6cd8316f4b6c159d5167a1
SHA1753428b4736ffb2c9e3eb50f89255b212768c55a
SHA2561965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA5129c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f
-
Filesize
9B
MD57ef570b2b21e58fd906ef1a980d64425
SHA118502489f652e74f8972bbfa100d5c163d719ab7
SHA256c3ce1b9216b58ac7d9ed3b93e5e3a1d6a2473b53b5bc1f008a621def49517055
SHA512e1175d861a79d62b85cd18661375f1c956dcc97e958765dc225f3aa4b0f0100ca9e17b9c61f5e18fc2a96e5167c0563f60645033aff1be1ec2f372c1b9a8b35f