Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2022, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
7e8199d7ff9c7e54ae178ebecc71e9fd11ef07a33a672b3a6b66cfbf10c705c0.exe
Resource
win10v2004-20220812-en
General
-
Target
7e8199d7ff9c7e54ae178ebecc71e9fd11ef07a33a672b3a6b66cfbf10c705c0.exe
-
Size
733KB
-
MD5
caaf78824994f7518f5ea8d29a765c4e
-
SHA1
47842a6f46693e492783f38d275fa25222375286
-
SHA256
7e8199d7ff9c7e54ae178ebecc71e9fd11ef07a33a672b3a6b66cfbf10c705c0
-
SHA512
9bbee21d24efb122b41025f861ee384bef0d01a20425bab53aba2bfc4bc94f067b5631b737925338b830b755539fd4222d6d755aa014f595be0e341d87379191
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3432 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 9 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 456 schtasks.exe 2788 schtasks.exe 4712 schtasks.exe 1152 schtasks.exe 1476 schtasks.exe 2628 schtasks.exe 5112 schtasks.exe 3232 schtasks.exe 2804 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1164 powershell.exe 1164 powershell.exe 4480 powershell.exe 4480 powershell.exe 1256 powershell.exe 3432 dllhost.exe 1256 powershell.exe 1256 powershell.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe 3432 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1164 powershell.exe Token: SeDebugPrivilege 1780 7e8199d7ff9c7e54ae178ebecc71e9fd11ef07a33a672b3a6b66cfbf10c705c0.exe Token: SeDebugPrivilege 4480 powershell.exe Token: SeDebugPrivilege 1256 powershell.exe Token: SeDebugPrivilege 3432 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1780 wrote to memory of 3380 1780 7e8199d7ff9c7e54ae178ebecc71e9fd11ef07a33a672b3a6b66cfbf10c705c0.exe 81 PID 1780 wrote to memory of 3380 1780 7e8199d7ff9c7e54ae178ebecc71e9fd11ef07a33a672b3a6b66cfbf10c705c0.exe 81 PID 1780 wrote to memory of 3380 1780 7e8199d7ff9c7e54ae178ebecc71e9fd11ef07a33a672b3a6b66cfbf10c705c0.exe 81 PID 3380 wrote to memory of 1412 3380 cmd.exe 83 PID 3380 wrote to memory of 1412 3380 cmd.exe 83 PID 3380 wrote to memory of 1412 3380 cmd.exe 83 PID 3380 wrote to memory of 1164 3380 cmd.exe 84 PID 3380 wrote to memory of 1164 3380 cmd.exe 84 PID 3380 wrote to memory of 1164 3380 cmd.exe 84 PID 3380 wrote to memory of 4480 3380 cmd.exe 85 PID 3380 wrote to memory of 4480 3380 cmd.exe 85 PID 3380 wrote to memory of 4480 3380 cmd.exe 85 PID 1780 wrote to memory of 3432 1780 7e8199d7ff9c7e54ae178ebecc71e9fd11ef07a33a672b3a6b66cfbf10c705c0.exe 86 PID 1780 wrote to memory of 3432 1780 7e8199d7ff9c7e54ae178ebecc71e9fd11ef07a33a672b3a6b66cfbf10c705c0.exe 86 PID 1780 wrote to memory of 3432 1780 7e8199d7ff9c7e54ae178ebecc71e9fd11ef07a33a672b3a6b66cfbf10c705c0.exe 86 PID 3380 wrote to memory of 1256 3380 cmd.exe 87 PID 3380 wrote to memory of 1256 3380 cmd.exe 87 PID 3380 wrote to memory of 1256 3380 cmd.exe 87 PID 3432 wrote to memory of 4152 3432 dllhost.exe 88 PID 3432 wrote to memory of 4152 3432 dllhost.exe 88 PID 3432 wrote to memory of 4152 3432 dllhost.exe 88 PID 3432 wrote to memory of 2060 3432 dllhost.exe 89 PID 3432 wrote to memory of 2060 3432 dllhost.exe 89 PID 3432 wrote to memory of 2060 3432 dllhost.exe 89 PID 3432 wrote to memory of 1184 3432 dllhost.exe 90 PID 3432 wrote to memory of 1184 3432 dllhost.exe 90 PID 3432 wrote to memory of 1184 3432 dllhost.exe 90 PID 3432 wrote to memory of 1560 3432 dllhost.exe 91 PID 3432 wrote to memory of 1560 3432 dllhost.exe 91 PID 3432 wrote to memory of 1560 3432 dllhost.exe 91 PID 3432 wrote to memory of 2516 3432 dllhost.exe 96 PID 3432 wrote to memory of 2516 3432 dllhost.exe 96 PID 3432 wrote to memory of 2516 3432 dllhost.exe 96 PID 3432 wrote to memory of 4352 3432 dllhost.exe 93 PID 3432 wrote to memory of 4352 3432 dllhost.exe 93 PID 3432 wrote to memory of 4352 3432 dllhost.exe 93 PID 3432 wrote to memory of 4532 3432 dllhost.exe 99 PID 3432 wrote to memory of 4532 3432 dllhost.exe 99 PID 3432 wrote to memory of 4532 3432 dllhost.exe 99 PID 3432 wrote to memory of 3396 3432 dllhost.exe 101 PID 3432 wrote to memory of 3396 3432 dllhost.exe 101 PID 3432 wrote to memory of 3396 3432 dllhost.exe 101 PID 3432 wrote to memory of 4052 3432 dllhost.exe 104 PID 3432 wrote to memory of 4052 3432 dllhost.exe 104 PID 3432 wrote to memory of 4052 3432 dllhost.exe 104 PID 3432 wrote to memory of 3308 3432 dllhost.exe 105 PID 3432 wrote to memory of 3308 3432 dllhost.exe 105 PID 3432 wrote to memory of 3308 3432 dllhost.exe 105 PID 3432 wrote to memory of 2344 3432 dllhost.exe 108 PID 3432 wrote to memory of 2344 3432 dllhost.exe 108 PID 3432 wrote to memory of 2344 3432 dllhost.exe 108 PID 3432 wrote to memory of 4892 3432 dllhost.exe 109 PID 3432 wrote to memory of 4892 3432 dllhost.exe 109 PID 3432 wrote to memory of 4892 3432 dllhost.exe 109 PID 1560 wrote to memory of 1152 1560 cmd.exe 112 PID 1560 wrote to memory of 1152 1560 cmd.exe 112 PID 1560 wrote to memory of 1152 1560 cmd.exe 112 PID 4152 wrote to memory of 2804 4152 cmd.exe 113 PID 4152 wrote to memory of 2804 4152 cmd.exe 113 PID 4152 wrote to memory of 2804 4152 cmd.exe 113 PID 2516 wrote to memory of 1476 2516 cmd.exe 114 PID 2516 wrote to memory of 1476 2516 cmd.exe 114 PID 2516 wrote to memory of 1476 2516 cmd.exe 114 PID 1184 wrote to memory of 2628 1184 cmd.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e8199d7ff9c7e54ae178ebecc71e9fd11ef07a33a672b3a6b66cfbf10c705c0.exe"C:\Users\Admin\AppData\Local\Temp\7e8199d7ff9c7e54ae178ebecc71e9fd11ef07a33a672b3a6b66cfbf10c705c0.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:1412
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2060
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2628
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1152
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4352
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4712
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4532
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3396
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:456
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk985" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4052
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk985" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3232
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5205" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3308
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5205" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:5112
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5504" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2344
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk460" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4892
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:3600
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4124
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:4188
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:1460
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:2740
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:1432
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
963KB
MD5c711b65070ebf22c6bc36e4d9dfeca9c
SHA1e9da5682abf0f900b85747d0750c4bd90d346846
SHA256325727b16f999a8bfb7116025ba38eaeb5f8d6ac026ac98dc87e8a64a6869072
SHA512fcc8ad6c9842580a7243dbced77360ee6cdd1ecdc7bc96122478ad0c08024994b14c9ee5b1829d91282be04a0e37fb199dcd7409cf81d34827708e1137c11278
-
Filesize
963KB
MD5c711b65070ebf22c6bc36e4d9dfeca9c
SHA1e9da5682abf0f900b85747d0750c4bd90d346846
SHA256325727b16f999a8bfb7116025ba38eaeb5f8d6ac026ac98dc87e8a64a6869072
SHA512fcc8ad6c9842580a7243dbced77360ee6cdd1ecdc7bc96122478ad0c08024994b14c9ee5b1829d91282be04a0e37fb199dcd7409cf81d34827708e1137c11278
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD500b7c91cca05fcd515f60f4b5a06d153
SHA1cf2d3612b18675d98c25131450fad7ba8e6b4ab7
SHA2564f01ca26b6b24614fc05f6af5a4277c741c8683cdb40aa0bc16c5a2b3397ae32
SHA512ff7d3946bb6218cb564c3c4150b332070fcfe595726665a87c26a54bc175d0523e17b952e18dc14b8d1cad07549248857ff1e47cc20a2309ea261deb3d1c1bcb
-
Filesize
18KB
MD563dac9f36c54751d62ce163c606ea8ae
SHA103fe96f9ececa6ba801d98ea3a713378ec2fa5ea
SHA2567361e89310d2eade90609f4442b8b2a7022a1b085458bc070a7ba5a67512a069
SHA512d1bbe0325a7a3ac2ab0c3d0dab49b595401eb237af46fd7a59237cdc449a60d92055e53c0c3619862349aca52ea1b81ed42fe89213fa38b83a18e0e798cf2905