Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe
Resource
win7-20231129-en
General
-
Target
c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe
-
Size
9.0MB
-
MD5
4921d7a6d49401873cff200a4f3d990d
-
SHA1
3d008d53e798505b858ff48574f3080210c56e27
-
SHA256
c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047
-
SHA512
9bc506b0615f3e7ba18ed70c92bef4dff257aad5437f17670ba88d8aec1ce20b0b46f8c194918e2c0fa0fa0397ec0ef2f954801da09fbf211c8597936fc097c4
-
SSDEEP
98304:F6D7RBxsErIVyJTk8LJ5i4J/OCV4HEZFrp:QRw08yJIC5uuT
Malware Config
Extracted
quasar
1.4.1
Office04
93.123.85.108:4782
e14b8f59-979b-4ebf-8602-dd3c4d6c301e
-
encryption_key
534734397C0FA9A1D28F061AD75DF4100BFF5787
-
install_name
Msconfig.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 8 IoCs
resource yara_rule behavioral1/memory/2540-50-0x0000000000680000-0x00000000009A4000-memory.dmp family_quasar behavioral1/memory/2540-47-0x0000000000680000-0x00000000009A4000-memory.dmp family_quasar behavioral1/memory/2540-43-0x0000000000680000-0x00000000009A4000-memory.dmp family_quasar behavioral1/memory/2540-42-0x0000000000680000-0x00000000009A4000-memory.dmp family_quasar behavioral1/memory/2540-39-0x0000000000680000-0x00000000009A4000-memory.dmp family_quasar behavioral1/memory/2540-37-0x0000000000680000-0x00000000009A4000-memory.dmp family_quasar behavioral1/memory/1452-90-0x00000000006A0000-0x00000000009C4000-memory.dmp family_quasar behavioral1/memory/1452-82-0x00000000006A0000-0x00000000009C4000-memory.dmp family_quasar -
Detects Windows executables referencing non-Windows User-Agents 8 IoCs
resource yara_rule behavioral1/memory/2540-50-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2540-47-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2540-43-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2540-42-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2540-39-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/2540-37-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/1452-90-0x00000000006A0000-0x00000000009C4000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral1/memory/1452-82-0x00000000006A0000-0x00000000009C4000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 8 IoCs
resource yara_rule behavioral1/memory/2540-50-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/memory/2540-47-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/memory/2540-43-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/memory/2540-42-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/memory/2540-39-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/memory/2540-37-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/memory/1452-90-0x00000000006A0000-0x00000000009C4000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/memory/1452-82-0x00000000006A0000-0x00000000009C4000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables containing common artifacts observed in infostealers 8 IoCs
resource yara_rule behavioral1/memory/2540-50-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_GENInfoStealer behavioral1/memory/2540-47-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_GENInfoStealer behavioral1/memory/2540-43-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_GENInfoStealer behavioral1/memory/2540-42-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_GENInfoStealer behavioral1/memory/2540-39-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_GENInfoStealer behavioral1/memory/2540-37-0x0000000000680000-0x00000000009A4000-memory.dmp INDICATOR_SUSPICIOUS_GENInfoStealer behavioral1/memory/1452-90-0x00000000006A0000-0x00000000009C4000-memory.dmp INDICATOR_SUSPICIOUS_GENInfoStealer behavioral1/memory/1452-82-0x00000000006A0000-0x00000000009C4000-memory.dmp INDICATOR_SUSPICIOUS_GENInfoStealer -
Detects executables packed with SmartAssembly 14 IoCs
resource yara_rule behavioral1/memory/2040-1-0x0000000000CA0000-0x00000000015AE000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2620-20-0x0000000000880000-0x0000000000BAA000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2620-24-0x0000000000880000-0x0000000000BAA000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2620-16-0x0000000000880000-0x0000000000BAA000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2620-11-0x0000000000880000-0x0000000000BAA000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2620-15-0x0000000000880000-0x0000000000BAA000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2620-9-0x0000000000880000-0x0000000000BAA000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/files/0x000900000001650c-30.dat INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/1776-32-0x00000000000D0000-0x00000000009DE000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2312-66-0x00000000007E0000-0x0000000000B0A000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2312-69-0x00000000007E0000-0x0000000000B0A000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2312-62-0x00000000007E0000-0x0000000000B0A000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/1832-71-0x00000000013B0000-0x0000000001CBE000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/1232-110-0x00000000006C0000-0x00000000009EA000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly -
Executes dropped EXE 2 IoCs
pid Process 1776 msconfig.exe 1832 msconfig.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2040 set thread context of 2620 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 28 PID 2620 set thread context of 2540 2620 csc.exe 40 PID 1776 set thread context of 2312 1776 msconfig.exe 48 PID 2312 set thread context of 1452 2312 csc.exe 57 PID 1832 set thread context of 1232 1832 msconfig.exe 65 -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1648 schtasks.exe 1816 schtasks.exe 1728 schtasks.exe 2660 schtasks.exe 2792 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2540 csc.exe Token: SeDebugPrivilege 1452 csc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2540 csc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2620 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 28 PID 2040 wrote to memory of 2620 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 28 PID 2040 wrote to memory of 2620 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 28 PID 2040 wrote to memory of 2620 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 28 PID 2040 wrote to memory of 2620 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 28 PID 2040 wrote to memory of 2620 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 28 PID 2040 wrote to memory of 2620 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 28 PID 2040 wrote to memory of 2620 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 28 PID 2040 wrote to memory of 2620 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 28 PID 2040 wrote to memory of 2632 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 29 PID 2040 wrote to memory of 2632 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 29 PID 2040 wrote to memory of 2632 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 29 PID 2040 wrote to memory of 2632 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 29 PID 2040 wrote to memory of 2752 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 31 PID 2040 wrote to memory of 2752 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 31 PID 2040 wrote to memory of 2752 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 31 PID 2040 wrote to memory of 2752 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 31 PID 2752 wrote to memory of 2792 2752 cmd.exe 33 PID 2752 wrote to memory of 2792 2752 cmd.exe 33 PID 2752 wrote to memory of 2792 2752 cmd.exe 33 PID 2752 wrote to memory of 2792 2752 cmd.exe 33 PID 2040 wrote to memory of 2820 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 34 PID 2040 wrote to memory of 2820 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 34 PID 2040 wrote to memory of 2820 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 34 PID 2040 wrote to memory of 2820 2040 c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe 34 PID 1680 wrote to memory of 1776 1680 taskeng.exe 39 PID 1680 wrote to memory of 1776 1680 taskeng.exe 39 PID 1680 wrote to memory of 1776 1680 taskeng.exe 39 PID 1680 wrote to memory of 1776 1680 taskeng.exe 39 PID 2620 wrote to memory of 2540 2620 csc.exe 40 PID 2620 wrote to memory of 2540 2620 csc.exe 40 PID 2620 wrote to memory of 2540 2620 csc.exe 40 PID 2620 wrote to memory of 2540 2620 csc.exe 40 PID 2620 wrote to memory of 2540 2620 csc.exe 40 PID 2620 wrote to memory of 2540 2620 csc.exe 40 PID 2620 wrote to memory of 2540 2620 csc.exe 40 PID 2620 wrote to memory of 2540 2620 csc.exe 40 PID 2620 wrote to memory of 2540 2620 csc.exe 40 PID 2620 wrote to memory of 1224 2620 csc.exe 41 PID 2620 wrote to memory of 1224 2620 csc.exe 41 PID 2620 wrote to memory of 1224 2620 csc.exe 41 PID 2620 wrote to memory of 1224 2620 csc.exe 41 PID 2620 wrote to memory of 2444 2620 csc.exe 43 PID 2620 wrote to memory of 2444 2620 csc.exe 43 PID 2620 wrote to memory of 2444 2620 csc.exe 43 PID 2620 wrote to memory of 2444 2620 csc.exe 43 PID 2444 wrote to memory of 1648 2444 cmd.exe 45 PID 2444 wrote to memory of 1648 2444 cmd.exe 45 PID 2444 wrote to memory of 1648 2444 cmd.exe 45 PID 2444 wrote to memory of 1648 2444 cmd.exe 45 PID 2620 wrote to memory of 1716 2620 csc.exe 46 PID 2620 wrote to memory of 1716 2620 csc.exe 46 PID 2620 wrote to memory of 1716 2620 csc.exe 46 PID 2620 wrote to memory of 1716 2620 csc.exe 46 PID 1776 wrote to memory of 2312 1776 msconfig.exe 48 PID 1776 wrote to memory of 2312 1776 msconfig.exe 48 PID 1776 wrote to memory of 2312 1776 msconfig.exe 48 PID 1776 wrote to memory of 2312 1776 msconfig.exe 48 PID 1776 wrote to memory of 2312 1776 msconfig.exe 48 PID 1776 wrote to memory of 2312 1776 msconfig.exe 48 PID 1776 wrote to memory of 2312 1776 msconfig.exe 48 PID 1776 wrote to memory of 2312 1776 msconfig.exe 48 PID 1776 wrote to memory of 2312 1776 msconfig.exe 48 PID 1776 wrote to memory of 596 1776 msconfig.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe"C:\Users\Admin\AppData\Local\Temp\c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2540
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\msconfig"3⤵PID:1224
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe'" /f4⤵
- Creates scheduled task(s)
PID:1648
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" "C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe"3⤵PID:1716
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\msconfig"2⤵PID:2632
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe'" /f3⤵
- Creates scheduled task(s)
PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047.exe" "C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe"2⤵PID:2820
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5C47043C-40A4-4D38-879F-10E03CFF2293} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exeC:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵
- Suspicious use of SetThreadContext
PID:2312 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\msconfig"4⤵PID:2220
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe'" /f4⤵PID:2184
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe'" /f5⤵
- Creates scheduled task(s)
PID:1728
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" "C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe"4⤵PID:844
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\msconfig"3⤵PID:596
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe'" /f3⤵PID:1332
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe'" /f4⤵
- Creates scheduled task(s)
PID:1816
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe" "C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe"3⤵PID:2088
-
-
-
C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exeC:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"3⤵PID:1232
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Roaming\msconfig"3⤵PID:1932
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe'" /f3⤵PID:2564
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe'" /f4⤵
- Creates scheduled task(s)
PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe" "C:\Users\Admin\AppData\Roaming\msconfig\msconfig.exe"3⤵PID:3004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.0MB
MD54921d7a6d49401873cff200a4f3d990d
SHA13d008d53e798505b858ff48574f3080210c56e27
SHA256c9d37a723484c763c7c25000eb11c7bb9cda571a8c2b7886f4610af6cd473047
SHA5129bc506b0615f3e7ba18ed70c92bef4dff257aad5437f17670ba88d8aec1ce20b0b46f8c194918e2c0fa0fa0397ec0ef2f954801da09fbf211c8597936fc097c4