Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe
Resource
win10v2004-20240419-en
General
-
Target
fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe
-
Size
26KB
-
MD5
53f6a9b44b3d144149d4cf94458629c1
-
SHA1
b5b3a4ee1466cb9dffb334fd7c209981e05d2a92
-
SHA256
fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663
-
SHA512
436ca1fb0d44a0de231bdcb6b9f508f424e1cec454c4bbe2949c6d255cd0cf264fbaa620322839bb3253a9130ddb78769ec54880282bc2479b196cb9625d1b81
-
SSDEEP
768:+1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:YfgLdQAQfcfymN
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\E: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\V: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\O: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\J: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\I: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\H: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\X: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\U: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\Q: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\Y: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\P: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\N: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\L: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\K: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\M: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\Z: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\W: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\T: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\S: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened (read-only) \??\R: fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{4EFAFADA-208B-4BC3-8A2E-F71970AC49AC}\chrome_installer.exe fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\LC_MESSAGES\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files\Microsoft Games\Minesweeper\es-ES\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ie\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.7\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\ja-JP\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kab\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Windows Journal\en-US\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files (x86)\Windows Sidebar\fr-FR\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\it-IT\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Java\jre7\bin\plugin2\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Java\jre7\lib\security\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.en\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\es-ES\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files\Mozilla Firefox\browser\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Fancy\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File created C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATERMAR\_desktop.ini fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rundl132.exe fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2428 fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe 2428 fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe 2428 fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe 2428 fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe 2428 fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe 2428 fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe 2428 fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe 2428 fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe 2428 fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe 2428 fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2464 2428 fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe 28 PID 2428 wrote to memory of 2464 2428 fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe 28 PID 2428 wrote to memory of 2464 2428 fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe 28 PID 2428 wrote to memory of 2464 2428 fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe 28 PID 2464 wrote to memory of 1648 2464 net.exe 30 PID 2464 wrote to memory of 1648 2464 net.exe 30 PID 2464 wrote to memory of 1648 2464 net.exe 30 PID 2464 wrote to memory of 1648 2464 net.exe 30 PID 2428 wrote to memory of 1192 2428 fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe 21 PID 2428 wrote to memory of 1192 2428 fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe"C:\Users\Admin\AppData\Local\Temp\fda8aed7621f9b981120eb955108a4bcf3f71a8522ce67731047ea0c5bf0e663.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1648
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5ba55d6ba6a68791d94429483c57e588d
SHA130ef1d29307c594cb879b6effc80daab6c6e2b46
SHA25603ea9761b0ddbf5d7389aaabfc63907cfca83f346effb0b92c67372a1f5ae81d
SHA512373b8bbcd9a69c86571896989488fda9f2d24967e3cd988b43c6a0c69e363a4ffcb0fae81d58a938cc3fc594a9c4f4429d629ea4c6c13963788bc5d6b10d5fc1
-
Filesize
956KB
MD511d867c02b4f5964c4540078819c80e8
SHA171fa60a537b2aea9c4d02c9361127c1d1dbda075
SHA256937d48be7c8b694c5425cf88187c7f1dd4774e97396f11feb2abcba15247a90b
SHA512819b94e3e60b6bfce054d3dd0c5da1a4defcdeac22fe7ab1e1dbd80d6d8b91f9b1e76b00639714e3e5369999f42387655ee7b0e2f328a077475f3bf71cf80995
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
8B
MD535a8ee2041a708d5071bff39818311c3
SHA131114ee16a39b8ada4130a94c1c36ed74a563d2a
SHA256b2405b086204a9155a2dabf58717e53695089ece5d0af208cb960473ba350f8b
SHA512f17fa8c794a47b0134ac4d8e83010e8dce1a0f2ab74a400c571d6470737e386f4eb1351be6c5b153dc063c49d333b69ddf67871d2e0ffb3c02d243be0015f1f0