Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/12/2024, 23:47
Behavioral task
behavioral1
Sample
d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe
Resource
win7-20240903-en
General
-
Target
d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe
-
Size
172KB
-
MD5
615e7480ad72e1972fc90fbb1fa23bb0
-
SHA1
aec002a1465c11efcf492273bee97a22c8b6fa77
-
SHA256
d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333d
-
SHA512
8d223c74d73d83a093bfdbbf5c5a94c2326a022750ff4b55b0a95156d8098de57444a4efbbb09762cae12c002fbe953a3361014431440230307228c3c70e1b19
-
SSDEEP
3072:UVqoCl/YgjxEufVU0TbTyDDalRFvh4Bge+yJYL:UsLqdufVUNDaBh4GH
Malware Config
Extracted
njrat
im523
HacKed
learn-rage.gl.at.ply.gg:27556
e456603c650484e45e47269f670d15a9
-
reg_key
e456603c650484e45e47269f670d15a9
-
splitter
|'|'|
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Njrat family
-
Executes dropped EXE 10 IoCs
pid Process 2064 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe 2964 server.exe 2172 icsys.icn.exe 2824 server.exe 2732 explorer.exe 2860 spoolsv.exe 2856 svchost.exe 2600 spoolsv.exe 528 icsys.icn.exe 2940 explorer.exe -
Loads dropped DLL 8 IoCs
pid Process 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2064 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2964 server.exe 2172 icsys.icn.exe 2732 explorer.exe 2860 spoolsv.exe 2856 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe server.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2196 schtasks.exe 2292 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2964 server.exe 2964 server.exe 2964 server.exe 2964 server.exe 2964 server.exe 2964 server.exe 2964 server.exe 2964 server.exe 2964 server.exe 2964 server.exe 2964 server.exe 2964 server.exe 2964 server.exe 2964 server.exe 2964 server.exe 2964 server.exe 2172 icsys.icn.exe 2172 icsys.icn.exe 2172 icsys.icn.exe 2172 icsys.icn.exe 2172 icsys.icn.exe 2172 icsys.icn.exe 2172 icsys.icn.exe 2172 icsys.icn.exe 2172 icsys.icn.exe 2172 icsys.icn.exe 2172 icsys.icn.exe 2172 icsys.icn.exe 2172 icsys.icn.exe 2172 icsys.icn.exe 2172 icsys.icn.exe 2172 icsys.icn.exe 2172 icsys.icn.exe 2732 explorer.exe 2732 explorer.exe 2732 explorer.exe 2732 explorer.exe 2732 explorer.exe 2732 explorer.exe 2732 explorer.exe 2732 explorer.exe 2732 explorer.exe 2732 explorer.exe 2732 explorer.exe 2732 explorer.exe 2732 explorer.exe 2732 explorer.exe 2732 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2856 svchost.exe 2732 explorer.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 2964 server.exe 2172 icsys.icn.exe 2964 server.exe 2172 icsys.icn.exe 2732 explorer.exe 2732 explorer.exe 2860 spoolsv.exe 2860 spoolsv.exe 2856 svchost.exe 2856 svchost.exe 2600 spoolsv.exe 2600 spoolsv.exe 528 icsys.icn.exe 528 icsys.icn.exe 2940 explorer.exe 2940 explorer.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2064 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 30 PID 2304 wrote to memory of 2064 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 30 PID 2304 wrote to memory of 2064 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 30 PID 2304 wrote to memory of 2064 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 30 PID 2064 wrote to memory of 2964 2064 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe 31 PID 2064 wrote to memory of 2964 2064 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe 31 PID 2064 wrote to memory of 2964 2064 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe 31 PID 2064 wrote to memory of 2964 2064 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe 31 PID 2304 wrote to memory of 2172 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 32 PID 2304 wrote to memory of 2172 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 32 PID 2304 wrote to memory of 2172 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 32 PID 2304 wrote to memory of 2172 2304 d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe 32 PID 2964 wrote to memory of 2824 2964 server.exe 33 PID 2964 wrote to memory of 2824 2964 server.exe 33 PID 2964 wrote to memory of 2824 2964 server.exe 33 PID 2964 wrote to memory of 2824 2964 server.exe 33 PID 2172 wrote to memory of 2732 2172 icsys.icn.exe 34 PID 2172 wrote to memory of 2732 2172 icsys.icn.exe 34 PID 2172 wrote to memory of 2732 2172 icsys.icn.exe 34 PID 2172 wrote to memory of 2732 2172 icsys.icn.exe 34 PID 2732 wrote to memory of 2860 2732 explorer.exe 35 PID 2732 wrote to memory of 2860 2732 explorer.exe 35 PID 2732 wrote to memory of 2860 2732 explorer.exe 35 PID 2732 wrote to memory of 2860 2732 explorer.exe 35 PID 2860 wrote to memory of 2856 2860 spoolsv.exe 36 PID 2860 wrote to memory of 2856 2860 spoolsv.exe 36 PID 2860 wrote to memory of 2856 2860 spoolsv.exe 36 PID 2860 wrote to memory of 2856 2860 spoolsv.exe 36 PID 2856 wrote to memory of 2600 2856 svchost.exe 37 PID 2856 wrote to memory of 2600 2856 svchost.exe 37 PID 2856 wrote to memory of 2600 2856 svchost.exe 37 PID 2856 wrote to memory of 2600 2856 svchost.exe 37 PID 2732 wrote to memory of 3056 2732 explorer.exe 38 PID 2732 wrote to memory of 3056 2732 explorer.exe 38 PID 2732 wrote to memory of 3056 2732 explorer.exe 38 PID 2732 wrote to memory of 3056 2732 explorer.exe 38 PID 2856 wrote to memory of 2196 2856 svchost.exe 39 PID 2856 wrote to memory of 2196 2856 svchost.exe 39 PID 2856 wrote to memory of 2196 2856 svchost.exe 39 PID 2856 wrote to memory of 2196 2856 svchost.exe 39 PID 2964 wrote to memory of 528 2964 server.exe 42 PID 2964 wrote to memory of 528 2964 server.exe 42 PID 2964 wrote to memory of 528 2964 server.exe 42 PID 2964 wrote to memory of 528 2964 server.exe 42 PID 528 wrote to memory of 2940 528 icsys.icn.exe 43 PID 528 wrote to memory of 2940 528 icsys.icn.exe 43 PID 528 wrote to memory of 2940 528 icsys.icn.exe 43 PID 528 wrote to memory of 2940 528 icsys.icn.exe 43 PID 2856 wrote to memory of 2292 2856 svchost.exe 45 PID 2856 wrote to memory of 2292 2856 svchost.exe 45 PID 2856 wrote to memory of 2292 2856 svchost.exe 45 PID 2856 wrote to memory of 2292 2856 svchost.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe"C:\Users\Admin\AppData\Local\Temp\d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dN.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
\??\c:\users\admin\appdata\local\temp\d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exec:\users\admin\appdata\local\temp\d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\users\admin\appdata\local\temp\server.exec:\users\admin\appdata\local\temp\server.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:528 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2940
-
-
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:49 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2196
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 23:50 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2292
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:3056
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5faf85526071fc3b6f73b59d81e3211c8
SHA1ede2a1dc18bf2d7c77d9c49978c5ee0f77820cb7
SHA256a8a3e229cf8c556b81ac0f9c6b4afe42bce0e82ea43dfdc7feafeef5ec771e06
SHA512ad1ab964d510f1fdfe6af091f4e94e25d03db01c4c1904f83dcb16d290a5949df4738c93d6b16f723f09573f88608b7efa9f63945357343db3516dff4c4d5d45
-
\Users\Admin\AppData\Local\Temp\d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333dn.exe
Filesize37KB
MD5266dab6809fcc7a59f79a36edfff6682
SHA1ab0b69adea1fffa3f35705db40c9b4531624ea84
SHA25672f1513b6c29378f8e7cb14a727ccdea12f1581ebcb84a2a5dd7da8a2b70cc6d
SHA5124a8b8904023deb4b31f42bf50cb9d3e5018158a52fde270dac933f6978153b9c9bf801093d7aec22e654c7ff50e57f970db9b14ffbf4e3e61df5858ad2830f15
-
Filesize
172KB
MD5615e7480ad72e1972fc90fbb1fa23bb0
SHA1aec002a1465c11efcf492273bee97a22c8b6fa77
SHA256d9e9744f18db014ef164c4fb1ac1a6fbe56995280bf481ed60c91968e4fb333d
SHA5128d223c74d73d83a093bfdbbf5c5a94c2326a022750ff4b55b0a95156d8098de57444a4efbbb09762cae12c002fbe953a3361014431440230307228c3c70e1b19
-
Filesize
135KB
MD59fcb365b27da55232f5db607c1a5684d
SHA1906d0e0648cccc8aebbe79442e53fcab995442d6
SHA2567dce4cb6b2200d874a50723ab3fe2f318f8628103eed95b3cfaa7727a89c3994
SHA512ea219830897ca8b2d3dc39d90eefe4ced03f976ff128516878723ea505009b577c2e9a8169c050f440c97b54c750616acc14615740ca0f347d69a400fcf49dab
-
Filesize
135KB
MD5132c42fce8ec18f91789fa93b79682a0
SHA15ef4b5ea2ce5110a8feb61516e3790df8b0984ff
SHA25654f80fdcad386ec9c6acf068ff4524beae804d6648a0ceb5d54934fedb8712a3
SHA512d01813b9db8ce17f24aacef8aa695b16c9cbb3cae60fe342b9f61b52a1d8afb154a46793ee9d8fd3ec9c031b8d2323e6833825b0bcf3ed2b16a23d15e942c2fb
-
Filesize
135KB
MD572c5ff6c9ae2e0379a4085ce464d4e58
SHA183d2da1beaf2961f7583b1e060db9c0d3bf177aa
SHA25670b8dcc44a4043a4c0fb1e26e50952f4c8aa7c9c540112b0eface66ba81b0a84
SHA5129ce8c7ab03e2b89e61443e0fca102cae932f19eb514d2da1305ea3963ccab0c4f8e39aac228cddfbc7ffbf683b39207213e306879508051b3cad1e740ac430d2