Analysis
-
max time kernel
116s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2022 19:51
Static task
static1
Behavioral task
behavioral1
Sample
ece507d87a5b2732818a270942864957.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ece507d87a5b2732818a270942864957.exe
Resource
win10v2004-20220812-en
General
-
Target
ece507d87a5b2732818a270942864957.exe
-
Size
124KB
-
MD5
ece507d87a5b2732818a270942864957
-
SHA1
4fc0c57622b928125b55dcaaba92d966f9703789
-
SHA256
01f95e3eacbfef97fd73836f0cc2702dff49fc1da1283afb02231586064e6967
-
SHA512
e28d3aa2dc16624d0b8f2572eddcb6283b9d48bd0e8f3fc68711ede45226721029891bdbf6006cfb69bb5826a300a6691691b094db54fc25f2dd9bfec4a6b26f
-
SSDEEP
3072:g1i/NU8bOMYcYYcmy5cU+gTn6HOjDhWrzvvQwlgOks5YmMOMYcYY51i/NU8F:Oi/NjO5YBgegD0PHzSv3Oai/NN
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5} ece507d87a5b2732818a270942864957.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A0XC6A98-A14C-J35H-46UD-F5AR862J2AH5}\StubPath = "C:\\system.exe" ece507d87a5b2732818a270942864957.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation ece507d87a5b2732818a270942864957.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\ie.bat ece507d87a5b2732818a270942864957.exe File created C:\WINDOWS\SysWOW64\qx.bat ece507d87a5b2732818a270942864957.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\windows.exe ece507d87a5b2732818a270942864957.exe File opened for modification C:\WINDOWS\windows.exe ece507d87a5b2732818a270942864957.exe File opened for modification C:\WINDOWS\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1314057959" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1339995449" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000883ed98174fc174d8e18111dae0d912000000000020000000000106600000001000020000000def6a9c2dca3dd2b4f4ccbfea44b589b2ec686a0968703e1b30927c06ae48492000000000e80000000020000200000002dc0f00ec60d78f7743d21b07aaa82059a82ace1ab49e416a2c5ba63edbd3ea72000000013ba9218b1eb74463ec85fa317d576720f09374a44e8e881c4562c490d10d517400000008b002b391ea07aaca23dd36e25069aecf0029624fc465a5a7407872c64864dcc10b7fdd956c65cd12418a6d5053fef9f41b6d1b940cf874f4e19e2b49db59147 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{786E4E8A-2FC0-11ED-AECB-E62D9FD3CB0B} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30983117" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000883ed98174fc174d8e18111dae0d9120000000000200000000001066000000010000200000004352773becdeb053329c66e2df7cb6d814632b4c5eaa3ae4cb1983cf41875893000000000e8000000002000020000000b4bab80c617a9adb897bd6dcc8d0399f44591d6bc114cf117cfd8457a03e4fb120000000a1d1ec429f63423f6bb13836c55ffdf6030fe1cb167407581c8f07de713829bc40000000d338aeb09d28b00e322e2418a85d307d92249d353608b01fa319d896cbe91d7e0739317846ee1334a99a0ca12e29f42e99677397e042fc6ad30476c6ca01136e IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c75951cdc3d801 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1314057959" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30983117" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "369438900" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main ece507d87a5b2732818a270942864957.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30983117" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50009351cdc3d801 IEXPLORE.EXE -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://dhku.com" ece507d87a5b2732818a270942864957.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4988 ece507d87a5b2732818a270942864957.exe 4988 ece507d87a5b2732818a270942864957.exe 4988 ece507d87a5b2732818a270942864957.exe 4988 ece507d87a5b2732818a270942864957.exe 4988 ece507d87a5b2732818a270942864957.exe 4988 ece507d87a5b2732818a270942864957.exe 4988 ece507d87a5b2732818a270942864957.exe 4988 ece507d87a5b2732818a270942864957.exe 4988 ece507d87a5b2732818a270942864957.exe 4988 ece507d87a5b2732818a270942864957.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4944 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4944 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4988 ece507d87a5b2732818a270942864957.exe 4944 IEXPLORE.EXE 4944 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 4988 wrote to memory of 4944 4988 ece507d87a5b2732818a270942864957.exe 84 PID 4988 wrote to memory of 4944 4988 ece507d87a5b2732818a270942864957.exe 84 PID 4944 wrote to memory of 1540 4944 IEXPLORE.EXE 85 PID 4944 wrote to memory of 1540 4944 IEXPLORE.EXE 85 PID 4944 wrote to memory of 1540 4944 IEXPLORE.EXE 85 PID 4988 wrote to memory of 2420 4988 ece507d87a5b2732818a270942864957.exe 86 PID 4988 wrote to memory of 2420 4988 ece507d87a5b2732818a270942864957.exe 86 PID 4988 wrote to memory of 260 4988 ece507d87a5b2732818a270942864957.exe 87 PID 4988 wrote to memory of 260 4988 ece507d87a5b2732818a270942864957.exe 87 PID 4988 wrote to memory of 260 4988 ece507d87a5b2732818a270942864957.exe 87 PID 260 wrote to memory of 1244 260 cmd.exe 89 PID 260 wrote to memory of 1244 260 cmd.exe 89 PID 260 wrote to memory of 1244 260 cmd.exe 89 PID 4988 wrote to memory of 1820 4988 ece507d87a5b2732818a270942864957.exe 90 PID 4988 wrote to memory of 1820 4988 ece507d87a5b2732818a270942864957.exe 90 PID 4988 wrote to memory of 1820 4988 ece507d87a5b2732818a270942864957.exe 90 PID 1820 wrote to memory of 3512 1820 cmd.exe 92 PID 1820 wrote to memory of 3512 1820 cmd.exe 92 PID 1820 wrote to memory of 3512 1820 cmd.exe 92 PID 4988 wrote to memory of 3516 4988 ece507d87a5b2732818a270942864957.exe 93 PID 4988 wrote to memory of 3516 4988 ece507d87a5b2732818a270942864957.exe 93 PID 4988 wrote to memory of 3516 4988 ece507d87a5b2732818a270942864957.exe 93 PID 3516 wrote to memory of 4568 3516 cmd.exe 95 PID 3516 wrote to memory of 4568 3516 cmd.exe 95 PID 3516 wrote to memory of 4568 3516 cmd.exe 95 PID 4988 wrote to memory of 3400 4988 ece507d87a5b2732818a270942864957.exe 96 PID 4988 wrote to memory of 3400 4988 ece507d87a5b2732818a270942864957.exe 96 PID 4988 wrote to memory of 3400 4988 ece507d87a5b2732818a270942864957.exe 96 PID 3400 wrote to memory of 1144 3400 cmd.exe 98 PID 3400 wrote to memory of 1144 3400 cmd.exe 98 PID 3400 wrote to memory of 1144 3400 cmd.exe 98 PID 4988 wrote to memory of 4804 4988 ece507d87a5b2732818a270942864957.exe 99 PID 4988 wrote to memory of 4804 4988 ece507d87a5b2732818a270942864957.exe 99 PID 4988 wrote to memory of 4804 4988 ece507d87a5b2732818a270942864957.exe 99 PID 4804 wrote to memory of 5108 4804 cmd.exe 101 PID 4804 wrote to memory of 5108 4804 cmd.exe 101 PID 4804 wrote to memory of 5108 4804 cmd.exe 101 PID 4988 wrote to memory of 2656 4988 ece507d87a5b2732818a270942864957.exe 102 PID 4988 wrote to memory of 2656 4988 ece507d87a5b2732818a270942864957.exe 102 PID 4988 wrote to memory of 2656 4988 ece507d87a5b2732818a270942864957.exe 102 PID 2656 wrote to memory of 1536 2656 cmd.exe 104 PID 2656 wrote to memory of 1536 2656 cmd.exe 104 PID 2656 wrote to memory of 1536 2656 cmd.exe 104 PID 4988 wrote to memory of 2444 4988 ece507d87a5b2732818a270942864957.exe 105 PID 4988 wrote to memory of 2444 4988 ece507d87a5b2732818a270942864957.exe 105 PID 4988 wrote to memory of 2444 4988 ece507d87a5b2732818a270942864957.exe 105 PID 2444 wrote to memory of 5012 2444 cmd.exe 107 PID 2444 wrote to memory of 5012 2444 cmd.exe 107 PID 2444 wrote to memory of 5012 2444 cmd.exe 107 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 5108 attrib.exe 1536 attrib.exe 5012 attrib.exe 1244 attrib.exe 3512 attrib.exe 4568 attrib.exe 1144 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ece507d87a5b2732818a270942864957.exe"C:\Users\Admin\AppData\Local\Temp\ece507d87a5b2732818a270942864957.exe"1⤵
- Modifies Installed Components in the registry
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.212ok.com/Gbook.asp?qita2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4944 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan2⤵
- Modifies Internet Explorer settings
PID:2420
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:260 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:1244
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:3512
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"3⤵
- Views/modifies file attributes
PID:4568
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:1144
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"3⤵
- Views/modifies file attributes
PID:5108
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\WINDOWS\windows.exe"3⤵
- Drops file in Windows directory
- Views/modifies file attributes
PID:1536
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\attrib.exeattrib +h "c:\system.exe"3⤵
- Views/modifies file attributes
PID:5012
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD573a93efca54574d66f6140853a07c5a4
SHA1c013d4460ecb403187ed91e7c2020bda4735b605
SHA2566e6b30d58bf8e016fe6e03b46a31f15ab0dab96242e1f8e3cb655db15d20eac6
SHA512b1125b8f13676f9111f55fc86b64cc7e856e591182b3ffbec44597f897e61f2d87d4c497c1b5e391f683e0ae311a678394ae9122454f1aac7795d89a904445d9
-
Filesize
124KB
MD5d2ac516ad501a44b8fc98d00849f089b
SHA15d02ca637d5a2d2e244bf546914efc580a0e70b0
SHA25652ededf37098c063423c44be0267ff96fcd5ba9ba4a3bb63d377e639618cef2b
SHA5126c46a8ddba500c9346a158af5babeaa16c85bb5d768e3b8a9ba046084285aab2c75a9275b1eba36f08a878a0d236ae2b2a734592d24e47a60fbcf5468a35b61c